McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 9 Internet Control Message Protocol (ICMP)

Slides:



Advertisements
Similar presentations
Computer Networks21-1 Chapter 21. Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Address Mapping 21.2 ICMP 21.3 IGMP 21.4 ICMPv6.
Advertisements

CSCI 4550/8556 Computer Networks Comer, Chapter 23: An Error Reporting Mechanism (ICMP)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 9 Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
1 Internet Networking Spring 2002 Tutorial 4 ICMP (Internet Control Message Protocol)
Internet Control Message Protocol (ICMP)
1 CCNA 2 v3.1 Module 8. 2 TCP/IP Suite Error and Control Messages CCNA 2 Module 8.
1 K. Salah Module 5.3: Internet Control Message Protocol Why need ICMP? IP and ICMP ICMP Message Format ICMP Error Reporting messages ICMP Query messages.
1 Internet Control Message Protocol (ICMP) RIZWAN REHMAN CCS, DU.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
TCP/IP Protocol Suite 1 Chapter 9 Upon completion you will be able to: Internet Control Message Protocol Be familiar with the ICMP message format Know.
1 CMPT 471 Networking II ICMP © Janice Regan, 2012.
TCP/IP Protocol Suite 1 Chapter 9 Upon completion you will be able to: Internet Control Message Protocol Be familiar with the ICMP message format Know.
Guide to TCP/IP, Third Edition
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 9 Internet Control Message.
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
Internet Control Message Protocol (ICMP)
1 Computer Communication & Networks Lecture 20 Network Layer: IP and Address Mapping (contd.) Waleed.
1 Version 3.1 modified by Brierley Module 8 TCP/IP Suite Error and Control Messages.
Page 19/13/2015 Chapter 8 Some conditions that must be met for host to host communication over an internetwork: a default gateway must be properly configured.
Covering ICMP (Ch 9) and IGMP (Section 12.3)
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Internet Control Message Protocol (ICMP). Objective l IP and ICMP l Why need ICMP? l ICMP Message Format l ICMP fields l Examples: »Ping »Traceroute.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 8 TCP/IP Suite Error and Control Messages.
© 2002, Cisco Systems, Inc. All rights reserved..
TCP/IP Illustracted Vol1. 제목 : IP Routing ( 수 ) 한 민 규
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 15 Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv6.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 31 Next Generation: IPv6 and ICMPv6.
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
Chapter 19 Network Layer Protocols Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Internet Protocols. Address Resolution IP Addresses are not recognized by hardware. If we know the IP address of a host, how do we find out the hardware.
Error and Control An IP datagram travels from node to node on the way to its destination Each router operates autonomously Failures or problems may occur.
Chapter 23 Internet Control Message Protocol used to report information and errors IP uses ICMP when it sends an error message ICMP uses IP to transport.
1 An Error Reporting Mechanism (ICMP). 2 IP Semantics IP is best-effort Datagrams can be –Lost –Delayed –Duplicated –Delivered out of order –Corrupted.
1 Chapter 23 Internetworking Part 3 (Control Messages, Error Handling, ICMP)
1 Kyung Hee University Chapter 9 ICMP. 2 Kyung Hee University Introduction to Internet Control Message Protocol (ICMP)  IP protocol has no error-reporting.
Internet Control Message Protocol (ICMP) Chapter 7.
Cisco 2 - Routers Perrine. J Page 112/19/2015 Chapter 8 TCP/IP Error Message Some of the conditions that must be met in order for host to host communication.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 8 TCP/IP Suite Error and Control Messages.
Information and Communication engineering (ICE) MUT ITEC4610 Network Switching and Routing ดร. ประวิทย์ ชุมชู หัวหน้าสาขาวิชาวิศวกรรมสารสนเทศและการสื่อสาร.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 10 Internet Group Management Protocol (IGMP)
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
TCP/IP Illustrated, Volume 1: The Protocols Chapter 6. ICMP: Internet Control Message Protocol ( 월 ) 김 철 환
Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Module 8 JEOPARDY CCNA2 v3 Module 8 RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 8 TCP/IP Suite Error and Control Messages.
1 Kyung Hee University Prof. Choong Seon HONG Chapter 9 ICMP.
1 Kyung Hee University Chapter 9 ICMP. 2 Kyung Hee University 9.1 Introduction  IP protocol has no error-reporting or error-correcting mechanism When.
1 Chapter 23 Internetworking Part 3 (Control Messages, Error Handling, ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
ICMP The IP provides unreliable and connectionless datagram delivery. The IP protocol has no error-reporting or error-correcting mechanism. The IP protocol.
Internet Control Message Protocol (ICMP)
21-2 ICMP(Internet control message protocol)
Recall IPv4 Datagram Format
CCNA 2 v3 JEOPARDY Module 8 CCNA2 v3 Module 8 K. Martin.
Chapter 9 ICMP.
Internet Control Message Protocol
8 Network Layer Part V Computer Networks Tutun Juhana
Byungchul Park ICMP & ICMPv DPNM Lab. Byungchul Park
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol Version 4 (ICMPv4)
Internet Control Message Protocol
Internet Control Message Protocol
TCP/IP Protocol Suite 1 Chapter 9 Upon completion you will be able to: Internet Control Message Protocol Be familiar with the ICMP message format Know.
Presentation transcript:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 9 Internet Control Message Protocol (ICMP)

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 CONTENTS TYPES OF MESSAGES MESSAGE FORMAT ERROR REPORTING QUERY CHECKSUM ICMP PACKAGE

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 9-1 Position of ICMP in the network layer

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 9-2 Encapsulation of ICMP packet

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 TYPES OF MESSAGES 9.1

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 9-3 ICMP messages

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 MESSAGE FORMAT 9.2

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 9-4 General format of ICMP messages

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 ERROR REPORTING 9.3

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 ICMP always reports error messages to the original source.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 9-5 Error-reporting messages

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Important points about ICMP error messages: Important points about ICMP error messages: 1. No ICMP error message for a datagram carrying an ICMP error message. 2. No ICMP error message for a fragmented datagram that is not the first fragment. 3. No ICMP error message for a datagram having a multicast address. 4. No ICMP error message for a datagram with a special address such as or

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 9-6 Contents of data field for error messages

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 9-7 Destination-unreachable format

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Destination-unreachable messages with codes 2 or 3 can be created only by the destination host. Other destination-unreachable messages can be created only by routers.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 A router cannot detect all problems that prevent the delivery of a packet.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 There is no flow-control mechanism in the IP protocol.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 9-8 Source-quench format

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 A source-quench message informs the source that a datagram has been discarded due to congestion in a router or the destination host. The source must slow down the sending of datagrams until the congestion is relieved.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 One source-quench message should be sent for each datagram that is discarded due to congestion.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Whenever a router receives a datagram with a time-to-live value of zero, it discards the datagram and sends a time-exceeded message to the original source.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 When the final destination does not receive all of the fragments in a set time, it discards the received fragments and sends a time-exceeded message to the original source.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 In a time-exceeded message, code 0 is used only by routers to show that the value of the time-to-live field is zero. Code 1 is used only by the destination host to show that not all of the fragments have arrived within a set time.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 9-9 Time-exceeded message format Code 0: Time to live Code 1: Fragmentation

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 A parameter-problem message can be created by a router or the destination host.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 9-10 Parameter-problem message format Code 0: Main header problem Code 1: Problem in the option field

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 9-11 Redirection concept

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 A host usually starts with a small routing table that is gradually augmented and updated. One of the tools to accomplish this is the redirection message.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 9-12 Redirection message format Code 0: Network specific Code 1: Host specific Code 2: Network specific (specified service) Code 3: Host specific (specified service)

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 A redirection message is sent from a router to a host on the same local network.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 QUERY 9.4

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 9-13 Query messages

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 An echo-request message can be sent by a host or router. An echo-reply message is sent by the host or router which receives an echo-request message.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Echo-request and echo-reply messages can be used by network managers to check the operation of the IP protocol.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Echo-request and echo-reply messages can test the reachability of a host. This is usually done by invoking the ping command.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 9-14 Echo-request and echo-reply message format Ping command can use theses messages.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 9-15 Timestamp-request and timestamp-reply message format

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Sending time  value of receive timestamp  value of original timestamp Receiving time  time the packet returned  value of transmit timestamp Round-trip time  sending time  receiving time

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Timestamp-request and timestamp-reply messages can be used to calculate the round-trip time between a source and a destination machine even if their clocks are not synchronized.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Value of original timestamp: 46 Value of receive timestamp: 59 Value of transmit timestamp: 60 Time the packet arrived: 67 Given the following information:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Sending time  59  46  13 milliseconds Receiving time  67  60  7 milliseconds Round-trip time  13  7  20 milliseconds We can calculate:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Time difference  receive timestamp  (original timestamp field  one-way time duration) Given the actual one-way time,

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Time difference  59  (46  10)  3 We have:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 The timestamp-request and timestamp-reply messages can be used to synchronize two clocks in two machines if the exact one-way time duration is known.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 9-16 Mask-request and mask-reply message format

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 9-17 Router solicitation message format

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 9-18 Router advertisement message format

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 CHECKSUM 9.5

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 9-19 Example of checksum calculation

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 ICMP PACKAGE 9.6

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 9-20 ICMP package