SlideShare a Scribd company logo
1 of 31
Network Layer Part V
Computer Networks
Tutun Juhana
Telecommunication Engineering
School of Electrical Engineering & Informatics
Institut Teknologi Bandung
8
INTERNET CONTROL MESSAGE
PROTOCOL VERSION 4 (ICMPV4)
3
The value of the protocol field in the IP datagram is 1 to indicate
that the IP data is an ICMP message
Messages
4
includes the IP
header of
the original
datagram + the first
8 bytes of data in
that datagram
5
Provides port numbers
(UDP and TCP) and
sequence number
(TCP).
ERROR REPORTING
MESSAGES
6
Error Reporting Messages
• No ICMP error message will be generated in response to a
datagram carrying an ICMP error message.
• No ICMP error message will be generated for a fragmented
datagram that is not the first fragment.
• No ICMP error message will be generated for a datagram having a
multicast address.
• No ICMP error message will be generated for a datagram having a
special address such as 127.0.0.0 or 0.0.0.0 7
Destination Unreachable
8
Note: For codes, please refer to Forouzan’s
Source Quench
9
Time Exceeded

10

11
Parameter Problem
If a router or the destination host discovers an ambiguous
or missing value in any field of the datagram, it discards the
datagram and sends a parameter-problem message back
to the source
12
Redirection
13
QUERY MESSAGES
14
Query Messages
• ICMP can also diagnose some network
problems  accomplished through the
query messages
15
Echo Request and Reply
• The echo-request and echo-reply messages are
designed for diagnostic purposes
• Network managers and users utilize this pair of
messages to identify network problems.
• The combination of echo-request and echo-reply
messages determines whether two systems
(hosts or routers) can communicate with each
other.
16
17
Timestamp Request and Reply
• Two machines (hosts or routers) can
use the timestamp-request and
timestamp-reply messages to:
–determine the round-trip time needed for
an IP datagram to travel between them
–synchronize the clocks in two machines
18
19
20
21
22
CHECKSUM
23
• In ICMP the checksum is calculated over
the entire message (header and data)
24
25
26
DEBUGGING TOOLS
27
Ping
• We can use the ping program to find if a host is alive and
responding
• The source host sends ICMP echo request messages
(type: 8, code: 0); the destination, if alive, responds with
ICMP echo reply messages
• The ping program sets the identifier field in the echo
request and reply message and starts the sequence
number from 0; this number is incremented by one each
time a new message is sent
• Note that ping can calculate the round-trip time. It inserts
the sending time in the data section of the message.
When the packet arrives it subtracts the arrival time from
the departure time to get the round-trip time (RTT).
28
29
Traceroute
• The traceroute program in UNIX or tracert
in Windows can be used to trace the route
of a packet from the source to the
destination
30
31

More Related Content

What's hot

Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Tutun Juhana
 
Network layer
Network layerNetwork layer
Network layersbkbca
 
Network layer ip address assignment and routing
Network layer ip address assignment and routingNetwork layer ip address assignment and routing
Network layer ip address assignment and routingHamzahMohammed4
 
Lecture 3 network layer
Lecture 3 network layerLecture 3 network layer
Lecture 3 network layerRonoh Kennedy
 
Routing, Different types of forwarding technique
Routing, Different types of forwarding techniqueRouting, Different types of forwarding technique
Routing, Different types of forwarding techniquerajib_
 
Routing table and routing algorithms
Routing table and routing algorithmsRouting table and routing algorithms
Routing table and routing algorithmslavanyapathy
 
Et4045-3-attacks-2
Et4045-3-attacks-2Et4045-3-attacks-2
Et4045-3-attacks-2Tutun Juhana
 
Introduction to data link layer
Introduction to data link layerIntroduction to data link layer
Introduction to data link layerswarna sudha
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)Ismail Mukiibi
 
Network Design For Alliance Française de Dhaka
Network Design For Alliance Française de DhakaNetwork Design For Alliance Française de Dhaka
Network Design For Alliance Française de DhakaMD. Naimur Rahman
 
Transport layer
Transport layer   Transport layer
Transport layer AnusuaBasu
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layerZee Haak
 
11 coms 525 tcpip - internet protocol - forward
11   coms 525 tcpip - internet protocol - forward11   coms 525 tcpip - internet protocol - forward
11 coms 525 tcpip - internet protocol - forwardPalanivel Kuppusamy
 

What's hot (20)

Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
 
Network layer
Network layerNetwork layer
Network layer
 
Network layer ip address assignment and routing
Network layer ip address assignment and routingNetwork layer ip address assignment and routing
Network layer ip address assignment and routing
 
Lecture 3 network layer
Lecture 3 network layerLecture 3 network layer
Lecture 3 network layer
 
Network layer logical addressing
Network layer logical addressingNetwork layer logical addressing
Network layer logical addressing
 
Routing, Different types of forwarding technique
Routing, Different types of forwarding techniqueRouting, Different types of forwarding technique
Routing, Different types of forwarding technique
 
Icmp
IcmpIcmp
Icmp
 
Routing table and routing algorithms
Routing table and routing algorithmsRouting table and routing algorithms
Routing table and routing algorithms
 
Routing
RoutingRouting
Routing
 
Et4045-3-attacks-2
Et4045-3-attacks-2Et4045-3-attacks-2
Et4045-3-attacks-2
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
Introduction to data link layer
Introduction to data link layerIntroduction to data link layer
Introduction to data link layer
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)
 
Mod5
Mod5Mod5
Mod5
 
Network Design For Alliance Française de Dhaka
Network Design For Alliance Française de DhakaNetwork Design For Alliance Française de Dhaka
Network Design For Alliance Française de Dhaka
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
Transport layer
Transport layer   Transport layer
Transport layer
 
Routing
RoutingRouting
Routing
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layer
 
11 coms 525 tcpip - internet protocol - forward
11   coms 525 tcpip - internet protocol - forward11   coms 525 tcpip - internet protocol - forward
11 coms 525 tcpip - internet protocol - forward
 

Viewers also liked

ET4045-2-cryptography-2
ET4045-2-cryptography-2ET4045-2-cryptography-2
ET4045-2-cryptography-2Tutun Juhana
 
ET4045-2-cryptography-3
ET4045-2-cryptography-3ET4045-2-cryptography-3
ET4045-2-cryptography-3Tutun Juhana
 
ET4045-3-attacks-1
ET4045-3-attacks-1ET4045-3-attacks-1
ET4045-3-attacks-1Tutun Juhana
 
ET4045-1-Introduction-2014
ET4045-1-Introduction-2014ET4045-1-Introduction-2014
ET4045-1-Introduction-2014Tutun Juhana
 
ET3003-1 introduction (Semester II 2013-2014)
ET3003-1 introduction (Semester II 2013-2014)ET3003-1 introduction (Semester II 2013-2014)
ET3003-1 introduction (Semester II 2013-2014)Tutun Juhana
 
ET4045-2-cryptography-1-2014
ET4045-2-cryptography-1-2014ET4045-2-cryptography-1-2014
ET4045-2-cryptography-1-2014Tutun Juhana
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things SecurityTutun Juhana
 

Viewers also liked (7)

ET4045-2-cryptography-2
ET4045-2-cryptography-2ET4045-2-cryptography-2
ET4045-2-cryptography-2
 
ET4045-2-cryptography-3
ET4045-2-cryptography-3ET4045-2-cryptography-3
ET4045-2-cryptography-3
 
ET4045-3-attacks-1
ET4045-3-attacks-1ET4045-3-attacks-1
ET4045-3-attacks-1
 
ET4045-1-Introduction-2014
ET4045-1-Introduction-2014ET4045-1-Introduction-2014
ET4045-1-Introduction-2014
 
ET3003-1 introduction (Semester II 2013-2014)
ET3003-1 introduction (Semester II 2013-2014)ET3003-1 introduction (Semester II 2013-2014)
ET3003-1 introduction (Semester II 2013-2014)
 
ET4045-2-cryptography-1-2014
ET4045-2-cryptography-1-2014ET4045-2-cryptography-1-2014
ET4045-2-cryptography-1-2014
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 

Similar to Et3003 sem2-1314-8 network layers v (icmpv4)

Similar to Et3003 sem2-1314-8 network layers v (icmpv4) (20)

Network Layer Part 6
Network Layer Part 6Network Layer Part 6
Network Layer Part 6
 
5. icmp
5. icmp5. icmp
5. icmp
 
ICMPV4
ICMPV4ICMPV4
ICMPV4
 
ICMP.ppt
ICMP.pptICMP.ppt
ICMP.ppt
 
Ch 19 Network-layer protocols - section 2
Ch 19   Network-layer protocols - section 2Ch 19   Network-layer protocols - section 2
Ch 19 Network-layer protocols - section 2
 
Ip and icmp
Ip and icmpIp and icmp
Ip and icmp
 
(Icmp) internet control message protocol version 4
(Icmp) internet control message protocol version 4(Icmp) internet control message protocol version 4
(Icmp) internet control message protocol version 4
 
icmp protocol.ppt
icmp protocol.ppticmp protocol.ppt
icmp protocol.ppt
 
Icmp
IcmpIcmp
Icmp
 
Icmp
IcmpIcmp
Icmp
 
05 coms 525 tcpip - icmp
05   coms 525 tcpip - icmp05   coms 525 tcpip - icmp
05 coms 525 tcpip - icmp
 
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxWireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
 
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdf
 
Ch09
Ch09Ch09
Ch09
 
New Creators
New CreatorsNew Creators
New Creators
 
Respostas wireshark icmp
Respostas wireshark icmpRespostas wireshark icmp
Respostas wireshark icmp
 
Lecture-05.pdf
Lecture-05.pdfLecture-05.pdf
Lecture-05.pdf
 
Wireshark ip sept_15_2009
Wireshark ip sept_15_2009Wireshark ip sept_15_2009
Wireshark ip sept_15_2009
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignments
 
NP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMPNP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMP
 

More from Tutun Juhana

What should you prepare for industry 4.0 era
What should you prepare for industry 4.0 eraWhat should you prepare for industry 4.0 era
What should you prepare for industry 4.0 eraTutun Juhana
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)Tutun Juhana
 
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)Tutun Juhana
 
Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)
Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)
Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)Tutun Juhana
 
Et3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlansEt3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlansTutun Juhana
 
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)Tutun Juhana
 
6 2 transport layer (tcp)
6 2 transport layer (tcp)6 2 transport layer (tcp)
6 2 transport layer (tcp)Tutun Juhana
 
Transport Layer (UDP)
Transport Layer (UDP)Transport Layer (UDP)
Transport Layer (UDP)Tutun Juhana
 
Network layer Part 7
Network layer Part 7Network layer Part 7
Network layer Part 7Tutun Juhana
 
Transport Layer Part 1
Transport Layer Part 1Transport Layer Part 1
Transport Layer Part 1Tutun Juhana
 
Network Layer Part 1
Network Layer Part 1Network Layer Part 1
Network Layer Part 1Tutun Juhana
 
Network layer Part 2
Network layer Part 2Network layer Part 2
Network layer Part 2Tutun Juhana
 

More from Tutun Juhana (15)

What should you prepare for industry 4.0 era
What should you prepare for industry 4.0 eraWhat should you prepare for industry 4.0 era
What should you prepare for industry 4.0 era
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
 
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
 
Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)
Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)
Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)
 
Et3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlansEt3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlans
 
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
 
IPv6 Introduction
IPv6 IntroductionIPv6 Introduction
IPv6 Introduction
 
6 2 transport layer (tcp)
6 2 transport layer (tcp)6 2 transport layer (tcp)
6 2 transport layer (tcp)
 
VLANs
VLANsVLANs
VLANs
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Transport Layer (UDP)
Transport Layer (UDP)Transport Layer (UDP)
Transport Layer (UDP)
 
Network layer Part 7
Network layer Part 7Network layer Part 7
Network layer Part 7
 
Transport Layer Part 1
Transport Layer Part 1Transport Layer Part 1
Transport Layer Part 1
 
Network Layer Part 1
Network Layer Part 1Network Layer Part 1
Network Layer Part 1
 
Network layer Part 2
Network layer Part 2Network layer Part 2
Network layer Part 2
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Et3003 sem2-1314-8 network layers v (icmpv4)

  • 1. Network Layer Part V Computer Networks Tutun Juhana Telecommunication Engineering School of Electrical Engineering & Informatics Institut Teknologi Bandung 8
  • 3. 3 The value of the protocol field in the IP datagram is 1 to indicate that the IP data is an ICMP message
  • 4. Messages 4 includes the IP header of the original datagram + the first 8 bytes of data in that datagram
  • 5. 5 Provides port numbers (UDP and TCP) and sequence number (TCP).
  • 7. Error Reporting Messages • No ICMP error message will be generated in response to a datagram carrying an ICMP error message. • No ICMP error message will be generated for a fragmented datagram that is not the first fragment. • No ICMP error message will be generated for a datagram having a multicast address. • No ICMP error message will be generated for a datagram having a special address such as 127.0.0.0 or 0.0.0.0 7
  • 8. Destination Unreachable 8 Note: For codes, please refer to Forouzan’s
  • 11. 11
  • 12. Parameter Problem If a router or the destination host discovers an ambiguous or missing value in any field of the datagram, it discards the datagram and sends a parameter-problem message back to the source 12
  • 15. Query Messages • ICMP can also diagnose some network problems  accomplished through the query messages 15
  • 16. Echo Request and Reply • The echo-request and echo-reply messages are designed for diagnostic purposes • Network managers and users utilize this pair of messages to identify network problems. • The combination of echo-request and echo-reply messages determines whether two systems (hosts or routers) can communicate with each other. 16
  • 17. 17
  • 18. Timestamp Request and Reply • Two machines (hosts or routers) can use the timestamp-request and timestamp-reply messages to: –determine the round-trip time needed for an IP datagram to travel between them –synchronize the clocks in two machines 18
  • 19. 19
  • 20. 20
  • 21. 21
  • 22. 22
  • 24. • In ICMP the checksum is calculated over the entire message (header and data) 24
  • 25. 25
  • 26. 26
  • 28. Ping • We can use the ping program to find if a host is alive and responding • The source host sends ICMP echo request messages (type: 8, code: 0); the destination, if alive, responds with ICMP echo reply messages • The ping program sets the identifier field in the echo request and reply message and starts the sequence number from 0; this number is incremented by one each time a new message is sent • Note that ping can calculate the round-trip time. It inserts the sending time in the data section of the message. When the packet arrives it subtracts the arrival time from the departure time to get the round-trip time (RTT). 28
  • 29. 29
  • 30. Traceroute • The traceroute program in UNIX or tracert in Windows can be used to trace the route of a packet from the source to the destination 30
  • 31. 31