SlideShare uma empresa Scribd logo
1 de 58
CChhaapptteerr 99 
IInntteerrnneett CCoonnttrrooll MMeessssaaggee 
PPrroottooccooll 
Objectives 
Upon completion you will be able to: 
• Be familiar with the ICMP message format 
• Know the types of error reporting messages 
• Know the types of query messages 
• Be able to calculate the ICMP checksum 
• Know how to use the ping and traceroute commands 
• Understand the modules and interactions of an ICMP package 
TCP/IP Protocol Suite 1
Figure 9.1 Position of ICMP in the network layer 
TCP/IP Protocol Suite 2
Figure 9.2 ICMP encapsulation 
TCP/IP Protocol Suite 3
9.1 TYPES OF MESSAGES 
ICMP messages are divided into error-reporting mmeessssaaggeess aanndd qquueerryy 
mmeessssaaggeess.. TThhee eerrrroorr--rreeppoorrttiinngg mmeessssaaggeess rreeppoorrtt pprroobblleemmss tthhaatt aa rroouutteerr oorr 
aa hhoosstt ((ddeessttiinnaattiioonn)) mmaayy eennccoouunntteerr.. TThhee qquueerryy mmeessssaaggeess ggeett ssppeecciiffiicc 
iinnffoorrmmaattiioonn ffrroomm aa rroouutteerr oorr aannootthheerr hhoosstt.. 
TCP/IP Protocol Suite 4
Figure 9.3 ICMP messages 
TCP/IP Protocol Suite 5
TTaabbllee 99..11 IICCMMPP mmeessssaaggeess 
TCP/IP Protocol Suite 6
9.2 MESSAGE FORMAT 
An ICMP message has an 8-byte header and a variable-ssiizzee ddaattaa sseeccttiioonn.. 
AAlltthhoouugghh tthhee ggeenneerraall ffoorrmmaatt ooff tthhee hheeaaddeerr iiss ddiiffffeerreenntt ffoorr eeaacchh 
mmeessssaaggee ttyyppee,, tthhee ffiirrsstt 44 bbyytteess aarree ccoommmmoonn ttoo aallll.. 
TCP/IP Protocol Suite 7
Figure 9.4 General format of ICMP messages 
TCP/IP Protocol Suite 8
9.3 ERROR REPORTING 
IP, as an unreliable protocol, is not concerned with eerrrroorr cchheecckkiinngg aanndd 
eerrrroorr ccoonnttrrooll.. IICCMMPP wwaass ddeessiiggnneedd,, iinn ppaarrtt,, ttoo ccoommppeennssaattee ffoorr tthhiiss 
sshhoorrttccoommiinngg.. IICCMMPP ddooeess nnoott ccoorrrreecctt eerrrroorrss,, iitt ssiimmppllyy rreeppoorrttss tthheemm.. 
TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: 
DDeessttiinnaattiioonn UUnnrreeaacchhaabbllee 
SSoouurrccee QQuueenncchh 
TTiimmee EExxcceeeeddeedd 
PPaarraammeetteerr PPrroobblleemm 
RReeddiirreeccttiioonn 
TCP/IP Protocol Suite 9
NNoottee:: 
ICMP always reports error messages 
to the original source. 
TCP/IP Protocol Suite 10
Figure 9.5 Error-reporting messages 
TCP/IP Protocol Suite 11
NNoottee:: 
The following are important points about ICMP 
error messages: 
❏ No ICMP error message will be generated in response 
to a datagram carrying an ICMP error message. 
❏ No ICMP error message will be generated for a 
fragmented datagram that is not the first fragment. 
❏ No ICMP error message will be generated for a 
datagram having a multicast address. 
❏ No ICMP error message will be generated for a 
datagram having a special address such as 127.0.0.0 or 
0.0.0.0. 
TCP/IP Protocol Suite 12
Figure 9.6 Contents of data field for the error messages 
TCP/IP Protocol Suite 13
Figure 9.7 Destination-unreachable format 
TCP/IP Protocol Suite 14
NNoottee:: 
Destination-unreachable messages 
with codes 2 or 3 can be created only 
by the destination host. 
Other destination-unreachable 
messages can be created only by 
routers. 
TCP/IP Protocol Suite 15
NNoottee:: 
A router cannot detect all problems 
that prevent the delivery of a packet. 
TCP/IP Protocol Suite 16
NNoottee:: 
There is no flow-control mechanism in 
the IP protocol. 
TCP/IP Protocol Suite 17
Figure 9.8 Source-quench format 
TCP/IP Protocol Suite 18
NNoottee:: 
A source-quench message informs the 
source that a datagram has been 
discarded due to congestion in a router 
or the destination host. 
The source must slow down the 
sending of datagrams until the 
congestion is relieved. 
TCP/IP Protocol Suite 19
NNoottee:: 
One source-quench message is sent for 
each datagram that is discarded due to 
congestion. 
TCP/IP Protocol Suite 20
NNoottee:: 
Whenever a router decrements a 
datagram with a time-to-live value to 
zero, it discards the datagram and 
sends a time-exceeded message to the 
original source. 
TCP/IP Protocol Suite 21
NNoottee:: 
When the final destination does not 
receive all of the fragments in a set 
time, it discards the received fragments 
and sends a time-exceeded message to 
the original source. 
TCP/IP Protocol Suite 22
NNoottee:: 
In a time-exceeded message, code 0 is 
used only by routers to show that the 
value of the time-to-live field is zero. 
Code 1 is used only by the destination 
host to show that not all of the 
fragments have arrived within a set 
time. 
TCP/IP Protocol Suite 23
Figure 9.9 Time-exceeded message format 
TCP/IP Protocol Suite 24
NNoottee:: 
A parameter-problem message can be 
created by a router or the destination 
host. 
TCP/IP Protocol Suite 25
Figure 9.10 Parameter-problem message format 
TCP/IP Protocol Suite 26
Figure 9.11 Redirection concept 
TCP/IP Protocol Suite 27
NNoottee:: 
A host usually starts with a small 
routing table that is gradually 
augmented and updated. One of the 
tools to accomplish this is the 
redirection message. 
TCP/IP Protocol Suite 28
Figure 9.12 Redirection message format 
TCP/IP Protocol Suite 29
NNoottee:: 
A redirection message is sent from a 
router to a host on the same local 
network. 
TCP/IP Protocol Suite 30
9.4 QUERY 
ICMP can also diagnose some network problems tthhrroouugghh tthhee qquueerryy 
mmeessssaaggeess,, aa ggrroouupp ooff ffoouurr ddiiffffeerreenntt ppaaiirrss ooff mmeessssaaggeess.. IInn tthhiiss ttyyppee ooff 
IICCMMPP mmeessssaaggee,, aa nnooddee sseennddss aa mmeessssaaggee tthhaatt iiss aannsswweerreedd iinn aa ssppeecciiffiicc 
ffoorrmmaatt bbyy tthhee ddeessttiinnaattiioonn nnooddee.. 
TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: 
EEcchhoo RReeqquueesstt aanndd RReeppllyy 
TTiimmeessttaammpp RReeqquueesstt aanndd RReeppllyy 
AAddddrreessss--MMaasskk RReeqquueesstt aanndd RReeppllyy 
RRoouutteerr SSoolliicciittaattiioonn aanndd AAddvveerrttiisseemmeenntt 
TCP/IP Protocol Suite 31
Figure 9.13 Query messages 
TCP/IP Protocol Suite 32
NNoottee:: 
An echo-request message can be sent 
by a host or router. An echo-reply 
message is sent by the host or router 
which receives an echo-request 
message. 
TCP/IP Protocol Suite 33
NNoottee:: 
Echo-request and echo-reply messages 
can be used by network managers to 
check the operation of the IP protocol. 
TCP/IP Protocol Suite 34
NNoottee:: 
Echo-request and echo-reply messages 
can test the reachability of a host. This 
is usually done by invoking the ping 
command. 
TCP/IP Protocol Suite 35
Figure 9.14 Echo-request and echo-reply messages 
TCP/IP Protocol Suite 36
Figure 9.15 Timestamp-request and timestamp-reply message format 
TCP/IP Protocol Suite 37
NNoottee:: 
Timestamp-request and timestamp-reply 
messages can be used to 
calculate the round-trip time between 
a source and a destination machine 
even if their clocks are not 
synchronized. 
TCP/IP Protocol Suite 38
NNoottee:: 
The timestamp-request and timestamp-reply 
messages can be used to 
synchronize two clocks in two 
machines if the exact one-way time 
duration is known. 
TCP/IP Protocol Suite 39
Figure 9.16 Mask-request and mask-reply message format 
TCP/IP Protocol Suite 40
Figure 9.17 Router-solicitation message format 
TCP/IP Protocol Suite 41
Figure 9.18 Router-advertisement message format 
TCP/IP Protocol Suite 42
9.5 CHECKSUM 
In ICMP the checksum is calculated over the eennttiirree mmeessssaaggee ((hheeaaddeerr 
aanndd ddaattaa)).. 
TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: 
CChheecckkssuumm CCaallccuullaattiioonn 
CChheecckkssuumm TTeessttiinngg 
TCP/IP Protocol Suite 43
ExamplE 1 
Figure 9.19 shows an example of checksum calculation for a 
simple echo-request message (see Figure 9.14). We randomly 
chose the identifier to be 1 and the sequence number to be 9. 
The message is divided into 16-bit (2-byte) words. The words 
are added together and the sum is complemented. Now the 
sender can put this value in the checksum field. 
See Next Slide 
TCP/IP Protocol Suite 44
Figure 9.19 Example of checksum calculation 
TCP/IP Protocol Suite 45
9.6 DEBUGGING TOOLS 
We introduce two tools that use IICCMMPP ffoorr ddeebbuuggggiinngg:: ppiinngg aanndd 
ttrraacceerroouuttee.. 
TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: 
PPiinngg 
TTrraacceerroouuttee 
TCP/IP Protocol Suite 46
ExamplE 2 
We use the ping program to test the server fhda.edu. The result 
is shown below: 
$ ping fhda.edu 
PING fhda.edu (153.18.8.1) 56 (84) bytes of data. 
64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=0 ttl=62 time=1.91 ms 
64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=1 ttl=62 time=2.04 ms 
64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=2 ttl=62 time=1.90 ms 
64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=3 ttl=62 time=1.97 ms 
64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=4 ttl=62 time=1.93 ms 
See Next Slide 
TCP/IP Protocol Suite 47
ExamplE 2 (ContinuEd) 
64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=5 ttl=62 time=2.00 ms 
64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=6 ttl=62 time=1.94 ms 
64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=7 ttl=62 time=1.94 ms 
64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=8 ttl=62 time=1.97 ms 
64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=9 ttl=62 time=1.89 ms 
64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=10 ttl=62 time=1.98 ms 
--- fhda.edu ping statistics --- 
11 packets transmitted, 11 received, 0% packet loss, time 10103ms 
rtt min/avg/max = 1.899/1.955/2.041 ms 
TCP/IP Protocol Suite 48
ExamplE 3 
For the this example, we want to know if the adelphia.net mail 
server is alive and running. The result is shown below: 
$ ping mail.adelphia.net 
PING mail.adelphia.net (68.168.78.100) 56(84) bytes of data. 
64 bytes from mail.adelphia.net (68.168.78.100): icmp_seq=0 ttl=48 time=85.4 ms 
64 bytes from mail.adelphia.net (68.168.78.100): icmp_seq=1 ttl=48 time=84.6 ms 
64 bytes from mail.adelphia.net (68.168.78.100): icmp_seq=2 ttl=48 time=84.9 ms 
64 bytes from mail.adelphia.net (68.168.78.100): icmp_seq=3 ttl=48 time=84.3 ms 
64 bytes from mail.adelphia.net (68.168.78.100): icmp_seq=4 ttl=48 time=84.5 ms 
See Next Slide 
TCP/IP Protocol Suite 49
ExamplE 3 (ContinuEd) 
64 bytes from mail.adelphia.net (68.168.78.100): icmp_seq=5 ttl=48 time=84.7 ms 
64 bytes from mail.adelphia.net (68.168.78.100): icmp_seq=6 ttl=48 time=84.6 ms 
64 bytes from mail.adelphia.net (68.168.78.100): icmp_seq=7 ttl=48 time=84.7 ms 
64 bytes from mail.adelphia.net (68.168.78.100): icmp_seq=8 ttl=48 time=84.4 ms 
64 bytes from mail.adelphia.net (68.168.78.100): icmp_seq=9 ttl=48 time=84.2 ms 
64 bytes from mail.adelphia.net (68.168.78.100): icmp_seq=10 ttl=48 time=84.9 ms 
64 bytes from mail.adelphia.net (68.168.78.100): icmp_seq=11 ttl=48 time=84.6 ms 
64 bytes from mail.adelphia.net (68.168.78.100): icmp_seq=12 ttl=48 time=84.5 ms 
--- mail.adelphia.net ping statistics --- 
14 packets transmitted, 13 received, 7% packet loss, time 13129ms 
rtt min/avg/max/mdev = 84.207/84.694/85.469 
TCP/IP Protocol Suite 50
Figure 9.20 The traceroute program operation 
TCP/IP Protocol Suite 51
ExamplE 4 
We use the traceroute program to find the route from the 
computer voyager.deanza.edu to the server fhda.edu. The 
following shows the result: 
$ traceroute fhda.edu 
traceroute to fhda.edu (153.18.8.1), 30 hops max, 38 byte packets 
1 Dcore.fhda.edu (153.18.31.254) 0.995 ms 0.899 ms 0.878 ms 
2 Dbackup.fhda.edu (153.18.251.4) 1.039 ms 1.064 ms 1.083 ms 
3 tiptoe.fhda.edu (153.18.8.1) 1.797 ms 1.642 ms 1.757 ms 
See Next Slide 
TCP/IP Protocol Suite 52
ExamplE 4 (ContinuEd) 
The un-numbered line after the command shows that the destination is 
153.18.8.1. The TTL value is 30 hops. The packet contains 38 bytes: 20 
bytes of IP header, 8 bytes of UDP header, and 10 bytes of application data. 
The application data is used by traceroute to keep track of the packets. 
The first line shows the first router visited. The router is named 
Dcore.fhda.edu with IP address 153.18.31.254. The first round trip time 
was 0.995 milliseconds, the second was 0.899 milliseconds, and the third 
was 0.878 milliseconds. 
The second line shows the second router visited. The router is named 
Dbackup.fhda.edu with IP address 153.18.251.4. The three round trip times 
are also shown. 
The third line shows the destination host. We know that this is the 
destination host because there are no more lines. The destination host is the 
server fhda.edu, but it is named tiptoe. fhda.edu with the IP address 
153.18.8.1. The three round trip times are also shown. 
TCP/IP Protocol Suite 53
ExamplE 5 
In this example, we trace a longer route, the route to 
xerox.com 
$ traceroute xerox.com 
traceroute to xerox.com (13.1.64.93), 30 hops max, 38 byte packets 
1 Dcore.fhda.edu (153.18.31.254) 0.622 ms 0.891 ms 0.875 ms 
2 Ddmz.fhda.edu (153.18.251.40) 2.132 ms 2.266 ms 2.094 ms 
... 
18 alpha.Xerox.COM (13.1.64.93) 11.172 ms 11.048 ms 10.922 ms 
Here there are 17 hops between source and destination. Note that some 
round trip times look unusual. It could be that a router is too busy to 
process the packet immediately. 
TCP/IP Protocol Suite 54
ExamplE 6 
An interesting point is that a host can send a traceroute packet 
to itself. This can be done by specifying the host as the 
destination. The packet goes to the loopback address as we 
expect. 
$ traceroute voyager.deanza.edu 
traceroute to voyager.deanza.edu (127.0.0.1), 30 hops max, 38 byte packets 
1 voyager (127.0.0.1) 0.178 ms 0.086 ms 0.055 ms 
TCP/IP Protocol Suite 55
ExamplE 7 
Finally, we use the traceroute program to find the route 
between fhda.edu and mhhe.com (McGraw-Hill server). We 
notice that we cannot find the whole route. When traceroute 
does not receive a response within 5 seconds, it prints an 
asterisk to signify a problem, and then tries the next hop.. 
$ traceroute mhhe.com 
traceroute to mhhe.com (198.45.24.104), 30 hops max, 38 byte packets 
1 Dcore.fhda.edu (153.18.31.254) 1.025 ms 0.892 ms 0.880 ms 
2 Ddmz.fhda.edu (153.18.251.40) 2.141 ms 2.159 ms 2.103 ms 
3 Cinic.fhda.edu (153.18.253.126) 2.159 ms 2.050 ms 1.992 ms 
... 
16 * * * 
17 * * * 
............... 
TCP/IP Protocol Suite 56
9.7 ICMP PACKAGE 
To give an idea of how ICMP can handle the sending aanndd rreecceeiivviinngg ooff 
IICCMMPP mmeessssaaggeess,, wwee pprreesseenntt oouurr vveerrssiioonn ooff aann IICCMMPP ppaacckkaaggee mmaaddee ooff 
ttwwoo mmoodduulleess:: aann iinnppuutt mmoodduullee aanndd aann oouuttppuutt mmoodduullee.. 
TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: 
IInnppuutt MMoodduullee 
OOuuttppuutt MMoodduullee 
TCP/IP Protocol Suite 57
Figure 9.21 ICMP package 
TCP/IP Protocol Suite 58

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
 
5. icmp
5. icmp5. icmp
5. icmp
 
Transportlayer tanenbaum
Transportlayer tanenbaumTransportlayer tanenbaum
Transportlayer tanenbaum
 
Congestion control
Congestion controlCongestion control
Congestion control
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
 
Socket programming
Socket programmingSocket programming
Socket programming
 
Aloha protocol in data communication and networking
Aloha protocol in data communication and networkingAloha protocol in data communication and networking
Aloha protocol in data communication and networking
 
Icmp
IcmpIcmp
Icmp
 
TCP - Transmission Control Protocol
TCP - Transmission Control ProtocolTCP - Transmission Control Protocol
TCP - Transmission Control Protocol
 
RTP.ppt
RTP.pptRTP.ppt
RTP.ppt
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Cs8601 4
Cs8601 4Cs8601 4
Cs8601 4
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Star topology in packet tracer By Tanjilur Rahman
Star topology in packet tracer By Tanjilur RahmanStar topology in packet tracer By Tanjilur Rahman
Star topology in packet tracer By Tanjilur Rahman
 
IGMP
IGMPIGMP
IGMP
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 

Destaque (20)

Chap 11 udp
Chap 11 udpChap 11 udp
Chap 11 udp
 
Ch09
Ch09Ch09
Ch09
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
Icmp V4 And Icmp V6
Icmp V4 And Icmp V6Icmp V4 And Icmp V6
Icmp V4 And Icmp V6
 
Chap 08 ip
Chap 08 ipChap 08 ip
Chap 08 ip
 
Chap 02 osi model
Chap 02 osi modelChap 02 osi model
Chap 02 osi model
 
Chap 27 next generation i pv6
Chap 27 next generation i pv6Chap 27 next generation i pv6
Chap 27 next generation i pv6
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 
Chap 28 security
Chap 28 securityChap 28 security
Chap 28 security
 
Chap 10 igmp
Chap 10 igmpChap 10 igmp
Chap 10 igmp
 
Chap2. ipv4-arp-icmp
Chap2. ipv4-arp-icmpChap2. ipv4-arp-icmp
Chap2. ipv4-arp-icmp
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
CCNA Icnd110 s00
CCNA Icnd110 s00CCNA Icnd110 s00
CCNA Icnd110 s00
 
Bootstrapping with bootp and dhcp
Bootstrapping with bootp and dhcpBootstrapping with bootp and dhcp
Bootstrapping with bootp and dhcp
 
Dhcp
DhcpDhcp
Dhcp
 
Ch21
Ch21Ch21
Ch21
 
ICMP
ICMPICMP
ICMP
 
Routers and planes
Routers and planesRouters and planes
Routers and planes
 
Routers and planes (1)
Routers and planes (1)Routers and planes (1)
Routers and planes (1)
 

Semelhante a Chap 09 icmp

(Icmp) internet control message protocol version 4
(Icmp) internet control message protocol version 4(Icmp) internet control message protocol version 4
(Icmp) internet control message protocol version 4Gouasmia Zakaria
 
Chap 13 stream control transmission protocol
Chap 13 stream control transmission protocolChap 13 stream control transmission protocol
Chap 13 stream control transmission protocolNoctorous Jamal
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocolMohd Arif
 
Tc pdump mod
Tc pdump modTc pdump mod
Tc pdump modSini
 
Please help with the below 3 questions, the python script is at the.pdf
Please help with the below 3  questions, the python script is at the.pdfPlease help with the below 3  questions, the python script is at the.pdf
Please help with the below 3 questions, the python script is at the.pdfsupport58
 
Reconsider TCPdump for Modern Troubleshooting
Reconsider TCPdump for Modern TroubleshootingReconsider TCPdump for Modern Troubleshooting
Reconsider TCPdump for Modern TroubleshootingAvi Networks
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3Roman Brovko
 
Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)Tutun Juhana
 
Network Layer Part 6
Network Layer Part 6Network Layer Part 6
Network Layer Part 6Tutun Juhana
 
Tcp congestion avoidance algorithm identification
Tcp congestion avoidance algorithm identificationTcp congestion avoidance algorithm identification
Tcp congestion avoidance algorithm identificationBala Lavanya
 

Semelhante a Chap 09 icmp (20)

Icmp
IcmpIcmp
Icmp
 
icmp protocol.ppt
icmp protocol.ppticmp protocol.ppt
icmp protocol.ppt
 
Chap 25 multimedia
Chap 25 multimediaChap 25 multimedia
Chap 25 multimedia
 
(Icmp) internet control message protocol version 4
(Icmp) internet control message protocol version 4(Icmp) internet control message protocol version 4
(Icmp) internet control message protocol version 4
 
Chap 13 stream control transmission protocol
Chap 13 stream control transmission protocolChap 13 stream control transmission protocol
Chap 13 stream control transmission protocol
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
 
Chap 11
Chap 11Chap 11
Chap 11
 
IGMP.ppt
IGMP.pptIGMP.ppt
IGMP.ppt
 
Chap 21 snmp
Chap 21 snmpChap 21 snmp
Chap 21 snmp
 
Tc pdump mod
Tc pdump modTc pdump mod
Tc pdump mod
 
Please help with the below 3 questions, the python script is at the.pdf
Please help with the below 3  questions, the python script is at the.pdfPlease help with the below 3  questions, the python script is at the.pdf
Please help with the below 3 questions, the python script is at the.pdf
 
Reconsider TCPdump for Modern Troubleshooting
Reconsider TCPdump for Modern TroubleshootingReconsider TCPdump for Modern Troubleshooting
Reconsider TCPdump for Modern Troubleshooting
 
User Datagram Protocol
User Datagram ProtocolUser Datagram Protocol
User Datagram Protocol
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3
 
Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)
 
Network Layer Part 6
Network Layer Part 6Network Layer Part 6
Network Layer Part 6
 
Troubleshooting basic networks
Troubleshooting basic networksTroubleshooting basic networks
Troubleshooting basic networks
 
8th_sem_final.pptx
8th_sem_final.pptx8th_sem_final.pptx
8th_sem_final.pptx
 
07 coms 525 tcpip - udp
07    coms 525 tcpip - udp07    coms 525 tcpip - udp
07 coms 525 tcpip - udp
 
Tcp congestion avoidance algorithm identification
Tcp congestion avoidance algorithm identificationTcp congestion avoidance algorithm identification
Tcp congestion avoidance algorithm identification
 

Mais de Noctorous Jamal

Chap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packetsChap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packetsNoctorous Jamal
 
Chap 05 ip addresses classfless
Chap 05 ip addresses classflessChap 05 ip addresses classfless
Chap 05 ip addresses classflessNoctorous Jamal
 
Chap 04 ip addresses classful
Chap 04 ip addresses classfulChap 04 ip addresses classful
Chap 04 ip addresses classfulNoctorous Jamal
 
Chap 03 underlying technology
Chap 03 underlying technologyChap 03 underlying technology
Chap 03 underlying technologyNoctorous Jamal
 
Lecture 8 The Communication System Finalterm Slides
Lecture 8  The Communication System Finalterm SlidesLecture 8  The Communication System Finalterm Slides
Lecture 8 The Communication System Finalterm SlidesNoctorous Jamal
 
Lecture 7 The Communication System Finalterm Slides
Lecture 7  The Communication System Finalterm SlidesLecture 7  The Communication System Finalterm Slides
Lecture 7 The Communication System Finalterm SlidesNoctorous Jamal
 
Lecture 6 The Communication System Finalterm Slides
Lecture 6  The Communication System Finalterm SlidesLecture 6  The Communication System Finalterm Slides
Lecture 6 The Communication System Finalterm SlidesNoctorous Jamal
 

Mais de Noctorous Jamal (19)

Chap 26 vpn
Chap 26 vpnChap 26 vpn
Chap 26 vpn
 
Chap 23 ip over atm
Chap 23 ip over atmChap 23 ip over atm
Chap 23 ip over atm
 
Chap 22 www http
Chap 22 www httpChap 22 www http
Chap 22 www http
 
Chap 20 smtp, pop, imap
Chap 20 smtp, pop, imapChap 20 smtp, pop, imap
Chap 20 smtp, pop, imap
 
Chap 19 ftp & tftp
Chap 19 ftp & tftpChap 19 ftp & tftp
Chap 19 ftp & tftp
 
Chap 18 telnet
Chap 18 telnetChap 18 telnet
Chap 18 telnet
 
Chap 17 dns
Chap 17 dnsChap 17 dns
Chap 17 dns
 
Chap 16 bootp & dhcp
Chap 16 bootp & dhcpChap 16 bootp & dhcp
Chap 16 bootp & dhcp
 
Chap 15 multicasting
Chap 15 multicastingChap 15 multicasting
Chap 15 multicasting
 
Chap 14 rip, ospf
Chap 14 rip, ospfChap 14 rip, ospf
Chap 14 rip, ospf
 
Chap 07 arp & rarp
Chap 07 arp & rarpChap 07 arp & rarp
Chap 07 arp & rarp
 
Chap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packetsChap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packets
 
Chap 05 ip addresses classfless
Chap 05 ip addresses classflessChap 05 ip addresses classfless
Chap 05 ip addresses classfless
 
Chap 04 ip addresses classful
Chap 04 ip addresses classfulChap 04 ip addresses classful
Chap 04 ip addresses classful
 
Chap 03 underlying technology
Chap 03 underlying technologyChap 03 underlying technology
Chap 03 underlying technology
 
Chap 01 intro
Chap 01 introChap 01 intro
Chap 01 intro
 
Lecture 8 The Communication System Finalterm Slides
Lecture 8  The Communication System Finalterm SlidesLecture 8  The Communication System Finalterm Slides
Lecture 8 The Communication System Finalterm Slides
 
Lecture 7 The Communication System Finalterm Slides
Lecture 7  The Communication System Finalterm SlidesLecture 7  The Communication System Finalterm Slides
Lecture 7 The Communication System Finalterm Slides
 
Lecture 6 The Communication System Finalterm Slides
Lecture 6  The Communication System Finalterm SlidesLecture 6  The Communication System Finalterm Slides
Lecture 6 The Communication System Finalterm Slides
 

Último

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 

Último (20)

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 

Chap 09 icmp

  • 1. CChhaapptteerr 99 IInntteerrnneett CCoonnttrrooll MMeessssaaggee PPrroottooccooll Objectives Upon completion you will be able to: • Be familiar with the ICMP message format • Know the types of error reporting messages • Know the types of query messages • Be able to calculate the ICMP checksum • Know how to use the ping and traceroute commands • Understand the modules and interactions of an ICMP package TCP/IP Protocol Suite 1
  • 2. Figure 9.1 Position of ICMP in the network layer TCP/IP Protocol Suite 2
  • 3. Figure 9.2 ICMP encapsulation TCP/IP Protocol Suite 3
  • 4. 9.1 TYPES OF MESSAGES ICMP messages are divided into error-reporting mmeessssaaggeess aanndd qquueerryy mmeessssaaggeess.. TThhee eerrrroorr--rreeppoorrttiinngg mmeessssaaggeess rreeppoorrtt pprroobblleemmss tthhaatt aa rroouutteerr oorr aa hhoosstt ((ddeessttiinnaattiioonn)) mmaayy eennccoouunntteerr.. TThhee qquueerryy mmeessssaaggeess ggeett ssppeecciiffiicc iinnffoorrmmaattiioonn ffrroomm aa rroouutteerr oorr aannootthheerr hhoosstt.. TCP/IP Protocol Suite 4
  • 5. Figure 9.3 ICMP messages TCP/IP Protocol Suite 5
  • 6. TTaabbllee 99..11 IICCMMPP mmeessssaaggeess TCP/IP Protocol Suite 6
  • 7. 9.2 MESSAGE FORMAT An ICMP message has an 8-byte header and a variable-ssiizzee ddaattaa sseeccttiioonn.. AAlltthhoouugghh tthhee ggeenneerraall ffoorrmmaatt ooff tthhee hheeaaddeerr iiss ddiiffffeerreenntt ffoorr eeaacchh mmeessssaaggee ttyyppee,, tthhee ffiirrsstt 44 bbyytteess aarree ccoommmmoonn ttoo aallll.. TCP/IP Protocol Suite 7
  • 8. Figure 9.4 General format of ICMP messages TCP/IP Protocol Suite 8
  • 9. 9.3 ERROR REPORTING IP, as an unreliable protocol, is not concerned with eerrrroorr cchheecckkiinngg aanndd eerrrroorr ccoonnttrrooll.. IICCMMPP wwaass ddeessiiggnneedd,, iinn ppaarrtt,, ttoo ccoommppeennssaattee ffoorr tthhiiss sshhoorrttccoommiinngg.. IICCMMPP ddooeess nnoott ccoorrrreecctt eerrrroorrss,, iitt ssiimmppllyy rreeppoorrttss tthheemm.. TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: DDeessttiinnaattiioonn UUnnrreeaacchhaabbllee SSoouurrccee QQuueenncchh TTiimmee EExxcceeeeddeedd PPaarraammeetteerr PPrroobblleemm RReeddiirreeccttiioonn TCP/IP Protocol Suite 9
  • 10. NNoottee:: ICMP always reports error messages to the original source. TCP/IP Protocol Suite 10
  • 11. Figure 9.5 Error-reporting messages TCP/IP Protocol Suite 11
  • 12. NNoottee:: The following are important points about ICMP error messages: ❏ No ICMP error message will be generated in response to a datagram carrying an ICMP error message. ❏ No ICMP error message will be generated for a fragmented datagram that is not the first fragment. ❏ No ICMP error message will be generated for a datagram having a multicast address. ❏ No ICMP error message will be generated for a datagram having a special address such as 127.0.0.0 or 0.0.0.0. TCP/IP Protocol Suite 12
  • 13. Figure 9.6 Contents of data field for the error messages TCP/IP Protocol Suite 13
  • 14. Figure 9.7 Destination-unreachable format TCP/IP Protocol Suite 14
  • 15. NNoottee:: Destination-unreachable messages with codes 2 or 3 can be created only by the destination host. Other destination-unreachable messages can be created only by routers. TCP/IP Protocol Suite 15
  • 16. NNoottee:: A router cannot detect all problems that prevent the delivery of a packet. TCP/IP Protocol Suite 16
  • 17. NNoottee:: There is no flow-control mechanism in the IP protocol. TCP/IP Protocol Suite 17
  • 18. Figure 9.8 Source-quench format TCP/IP Protocol Suite 18
  • 19. NNoottee:: A source-quench message informs the source that a datagram has been discarded due to congestion in a router or the destination host. The source must slow down the sending of datagrams until the congestion is relieved. TCP/IP Protocol Suite 19
  • 20. NNoottee:: One source-quench message is sent for each datagram that is discarded due to congestion. TCP/IP Protocol Suite 20
  • 21. NNoottee:: Whenever a router decrements a datagram with a time-to-live value to zero, it discards the datagram and sends a time-exceeded message to the original source. TCP/IP Protocol Suite 21
  • 22. NNoottee:: When the final destination does not receive all of the fragments in a set time, it discards the received fragments and sends a time-exceeded message to the original source. TCP/IP Protocol Suite 22
  • 23. NNoottee:: In a time-exceeded message, code 0 is used only by routers to show that the value of the time-to-live field is zero. Code 1 is used only by the destination host to show that not all of the fragments have arrived within a set time. TCP/IP Protocol Suite 23
  • 24. Figure 9.9 Time-exceeded message format TCP/IP Protocol Suite 24
  • 25. NNoottee:: A parameter-problem message can be created by a router or the destination host. TCP/IP Protocol Suite 25
  • 26. Figure 9.10 Parameter-problem message format TCP/IP Protocol Suite 26
  • 27. Figure 9.11 Redirection concept TCP/IP Protocol Suite 27
  • 28. NNoottee:: A host usually starts with a small routing table that is gradually augmented and updated. One of the tools to accomplish this is the redirection message. TCP/IP Protocol Suite 28
  • 29. Figure 9.12 Redirection message format TCP/IP Protocol Suite 29
  • 30. NNoottee:: A redirection message is sent from a router to a host on the same local network. TCP/IP Protocol Suite 30
  • 31. 9.4 QUERY ICMP can also diagnose some network problems tthhrroouugghh tthhee qquueerryy mmeessssaaggeess,, aa ggrroouupp ooff ffoouurr ddiiffffeerreenntt ppaaiirrss ooff mmeessssaaggeess.. IInn tthhiiss ttyyppee ooff IICCMMPP mmeessssaaggee,, aa nnooddee sseennddss aa mmeessssaaggee tthhaatt iiss aannsswweerreedd iinn aa ssppeecciiffiicc ffoorrmmaatt bbyy tthhee ddeessttiinnaattiioonn nnooddee.. TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: EEcchhoo RReeqquueesstt aanndd RReeppllyy TTiimmeessttaammpp RReeqquueesstt aanndd RReeppllyy AAddddrreessss--MMaasskk RReeqquueesstt aanndd RReeppllyy RRoouutteerr SSoolliicciittaattiioonn aanndd AAddvveerrttiisseemmeenntt TCP/IP Protocol Suite 31
  • 32. Figure 9.13 Query messages TCP/IP Protocol Suite 32
  • 33. NNoottee:: An echo-request message can be sent by a host or router. An echo-reply message is sent by the host or router which receives an echo-request message. TCP/IP Protocol Suite 33
  • 34. NNoottee:: Echo-request and echo-reply messages can be used by network managers to check the operation of the IP protocol. TCP/IP Protocol Suite 34
  • 35. NNoottee:: Echo-request and echo-reply messages can test the reachability of a host. This is usually done by invoking the ping command. TCP/IP Protocol Suite 35
  • 36. Figure 9.14 Echo-request and echo-reply messages TCP/IP Protocol Suite 36
  • 37. Figure 9.15 Timestamp-request and timestamp-reply message format TCP/IP Protocol Suite 37
  • 38. NNoottee:: Timestamp-request and timestamp-reply messages can be used to calculate the round-trip time between a source and a destination machine even if their clocks are not synchronized. TCP/IP Protocol Suite 38
  • 39. NNoottee:: The timestamp-request and timestamp-reply messages can be used to synchronize two clocks in two machines if the exact one-way time duration is known. TCP/IP Protocol Suite 39
  • 40. Figure 9.16 Mask-request and mask-reply message format TCP/IP Protocol Suite 40
  • 41. Figure 9.17 Router-solicitation message format TCP/IP Protocol Suite 41
  • 42. Figure 9.18 Router-advertisement message format TCP/IP Protocol Suite 42
  • 43. 9.5 CHECKSUM In ICMP the checksum is calculated over the eennttiirree mmeessssaaggee ((hheeaaddeerr aanndd ddaattaa)).. TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: CChheecckkssuumm CCaallccuullaattiioonn CChheecckkssuumm TTeessttiinngg TCP/IP Protocol Suite 43
  • 44. ExamplE 1 Figure 9.19 shows an example of checksum calculation for a simple echo-request message (see Figure 9.14). We randomly chose the identifier to be 1 and the sequence number to be 9. The message is divided into 16-bit (2-byte) words. The words are added together and the sum is complemented. Now the sender can put this value in the checksum field. See Next Slide TCP/IP Protocol Suite 44
  • 45. Figure 9.19 Example of checksum calculation TCP/IP Protocol Suite 45
  • 46. 9.6 DEBUGGING TOOLS We introduce two tools that use IICCMMPP ffoorr ddeebbuuggggiinngg:: ppiinngg aanndd ttrraacceerroouuttee.. TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: PPiinngg TTrraacceerroouuttee TCP/IP Protocol Suite 46
  • 47. ExamplE 2 We use the ping program to test the server fhda.edu. The result is shown below: $ ping fhda.edu PING fhda.edu (153.18.8.1) 56 (84) bytes of data. 64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=0 ttl=62 time=1.91 ms 64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=1 ttl=62 time=2.04 ms 64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=2 ttl=62 time=1.90 ms 64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=3 ttl=62 time=1.97 ms 64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=4 ttl=62 time=1.93 ms See Next Slide TCP/IP Protocol Suite 47
  • 48. ExamplE 2 (ContinuEd) 64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=5 ttl=62 time=2.00 ms 64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=6 ttl=62 time=1.94 ms 64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=7 ttl=62 time=1.94 ms 64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=8 ttl=62 time=1.97 ms 64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=9 ttl=62 time=1.89 ms 64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=10 ttl=62 time=1.98 ms --- fhda.edu ping statistics --- 11 packets transmitted, 11 received, 0% packet loss, time 10103ms rtt min/avg/max = 1.899/1.955/2.041 ms TCP/IP Protocol Suite 48
  • 49. ExamplE 3 For the this example, we want to know if the adelphia.net mail server is alive and running. The result is shown below: $ ping mail.adelphia.net PING mail.adelphia.net (68.168.78.100) 56(84) bytes of data. 64 bytes from mail.adelphia.net (68.168.78.100): icmp_seq=0 ttl=48 time=85.4 ms 64 bytes from mail.adelphia.net (68.168.78.100): icmp_seq=1 ttl=48 time=84.6 ms 64 bytes from mail.adelphia.net (68.168.78.100): icmp_seq=2 ttl=48 time=84.9 ms 64 bytes from mail.adelphia.net (68.168.78.100): icmp_seq=3 ttl=48 time=84.3 ms 64 bytes from mail.adelphia.net (68.168.78.100): icmp_seq=4 ttl=48 time=84.5 ms See Next Slide TCP/IP Protocol Suite 49
  • 50. ExamplE 3 (ContinuEd) 64 bytes from mail.adelphia.net (68.168.78.100): icmp_seq=5 ttl=48 time=84.7 ms 64 bytes from mail.adelphia.net (68.168.78.100): icmp_seq=6 ttl=48 time=84.6 ms 64 bytes from mail.adelphia.net (68.168.78.100): icmp_seq=7 ttl=48 time=84.7 ms 64 bytes from mail.adelphia.net (68.168.78.100): icmp_seq=8 ttl=48 time=84.4 ms 64 bytes from mail.adelphia.net (68.168.78.100): icmp_seq=9 ttl=48 time=84.2 ms 64 bytes from mail.adelphia.net (68.168.78.100): icmp_seq=10 ttl=48 time=84.9 ms 64 bytes from mail.adelphia.net (68.168.78.100): icmp_seq=11 ttl=48 time=84.6 ms 64 bytes from mail.adelphia.net (68.168.78.100): icmp_seq=12 ttl=48 time=84.5 ms --- mail.adelphia.net ping statistics --- 14 packets transmitted, 13 received, 7% packet loss, time 13129ms rtt min/avg/max/mdev = 84.207/84.694/85.469 TCP/IP Protocol Suite 50
  • 51. Figure 9.20 The traceroute program operation TCP/IP Protocol Suite 51
  • 52. ExamplE 4 We use the traceroute program to find the route from the computer voyager.deanza.edu to the server fhda.edu. The following shows the result: $ traceroute fhda.edu traceroute to fhda.edu (153.18.8.1), 30 hops max, 38 byte packets 1 Dcore.fhda.edu (153.18.31.254) 0.995 ms 0.899 ms 0.878 ms 2 Dbackup.fhda.edu (153.18.251.4) 1.039 ms 1.064 ms 1.083 ms 3 tiptoe.fhda.edu (153.18.8.1) 1.797 ms 1.642 ms 1.757 ms See Next Slide TCP/IP Protocol Suite 52
  • 53. ExamplE 4 (ContinuEd) The un-numbered line after the command shows that the destination is 153.18.8.1. The TTL value is 30 hops. The packet contains 38 bytes: 20 bytes of IP header, 8 bytes of UDP header, and 10 bytes of application data. The application data is used by traceroute to keep track of the packets. The first line shows the first router visited. The router is named Dcore.fhda.edu with IP address 153.18.31.254. The first round trip time was 0.995 milliseconds, the second was 0.899 milliseconds, and the third was 0.878 milliseconds. The second line shows the second router visited. The router is named Dbackup.fhda.edu with IP address 153.18.251.4. The three round trip times are also shown. The third line shows the destination host. We know that this is the destination host because there are no more lines. The destination host is the server fhda.edu, but it is named tiptoe. fhda.edu with the IP address 153.18.8.1. The three round trip times are also shown. TCP/IP Protocol Suite 53
  • 54. ExamplE 5 In this example, we trace a longer route, the route to xerox.com $ traceroute xerox.com traceroute to xerox.com (13.1.64.93), 30 hops max, 38 byte packets 1 Dcore.fhda.edu (153.18.31.254) 0.622 ms 0.891 ms 0.875 ms 2 Ddmz.fhda.edu (153.18.251.40) 2.132 ms 2.266 ms 2.094 ms ... 18 alpha.Xerox.COM (13.1.64.93) 11.172 ms 11.048 ms 10.922 ms Here there are 17 hops between source and destination. Note that some round trip times look unusual. It could be that a router is too busy to process the packet immediately. TCP/IP Protocol Suite 54
  • 55. ExamplE 6 An interesting point is that a host can send a traceroute packet to itself. This can be done by specifying the host as the destination. The packet goes to the loopback address as we expect. $ traceroute voyager.deanza.edu traceroute to voyager.deanza.edu (127.0.0.1), 30 hops max, 38 byte packets 1 voyager (127.0.0.1) 0.178 ms 0.086 ms 0.055 ms TCP/IP Protocol Suite 55
  • 56. ExamplE 7 Finally, we use the traceroute program to find the route between fhda.edu and mhhe.com (McGraw-Hill server). We notice that we cannot find the whole route. When traceroute does not receive a response within 5 seconds, it prints an asterisk to signify a problem, and then tries the next hop.. $ traceroute mhhe.com traceroute to mhhe.com (198.45.24.104), 30 hops max, 38 byte packets 1 Dcore.fhda.edu (153.18.31.254) 1.025 ms 0.892 ms 0.880 ms 2 Ddmz.fhda.edu (153.18.251.40) 2.141 ms 2.159 ms 2.103 ms 3 Cinic.fhda.edu (153.18.253.126) 2.159 ms 2.050 ms 1.992 ms ... 16 * * * 17 * * * ............... TCP/IP Protocol Suite 56
  • 57. 9.7 ICMP PACKAGE To give an idea of how ICMP can handle the sending aanndd rreecceeiivviinngg ooff IICCMMPP mmeessssaaggeess,, wwee pprreesseenntt oouurr vveerrssiioonn ooff aann IICCMMPP ppaacckkaaggee mmaaddee ooff ttwwoo mmoodduulleess:: aann iinnppuutt mmoodduullee aanndd aann oouuttppuutt mmoodduullee.. TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: IInnppuutt MMoodduullee OOuuttppuutt MMoodduullee TCP/IP Protocol Suite 57
  • 58. Figure 9.21 ICMP package TCP/IP Protocol Suite 58