Error reporting mechanism (icmp), Computer Network Security

ERROR REPORTING MECHANISM (ICMP)

INTRODUCTION:

 IP gives best-effort delivery. Delivery causes can be ignored; datagrams may be 'dropped on the ground'. Internet Control Message Protocol gives error-reporting mechanism.

 

BEST-EFFORT ERROR AND SEMANTICS DETECTION:

Internet layer can check a variety of errors: e.g.

  • Checksum
  • TTL expires
  • No route to receiver network.
  • Can't deliver to receiver host.

 

Internet layer discards datagrams with causes.

INTERNET CONTROL MESSAGE PROTOCOL:

Some errors can be noticed.  Router transmits message back to host in datagram. Message has information about problem. It is included in IP datagram.

TYPES OF MESSAGES:

Internet control Message Protocol (ICMP) describes error and informational messages. These are shown as follows:

1. ERROR MESSAGES:

These are as given:

  • Source quench
  • Time exceeded
  • Destination unreachable
  • Redirect
  • Fragmentation required

2. INFORMATIONAL MESSAGES:

These are as given:

  • Echo request/reply
  • Address mask request /reply
  • Router discovery

ICMP MESSAGE TRANSPORT:

 ICMP message transport is performed upon by getting ICMP included in IP. This is given in the figure below:

 

1981_ERROR REPORTING MECHANISM (ICMP).png

Posted Date: 8/1/2012 9:31:36 AM | Location : United States







Related Discussions:- Error reporting mechanism (icmp), Assignment Help, Ask Question on Error reporting mechanism (icmp), Get Answer, Expert's Help, Error reporting mechanism (icmp) Discussions

Write discussion on Error reporting mechanism (icmp)
Your posts are moderated
Related Questions
A  half-duplex (HDX) system gives communication in both directions, but only one direction at a time. Hardly, once a party stats receiving a signal, it must need for the transmi

Need Assignemnt help in Information security assignemnt

What is the function of key secrecy and algorithm secrecy in security?  Algorithm Secrecy is explained as follows: ‘Algorithm secrecy’ is a method of keeping an algorithm

Problem (1) - Alice, Bob and Charlie have a secret key a=3, b=4, c=5, respectively. - They want to find a common secret key using Diffie-Hellan key exchange protocol (with g

To master the complexity one must apply the given points. CONCENTRATE IN UNDERSTANDING THE CONCEPTS: Instead of details of wires used to connect computers to a specif

(a) Cost allocation mechanisms are important when it comes to establishing other aspects of inter-firm compensations and how these are transferred to the users. There are two pri

Da t a compre s sion and the trans p ort s e rvices,   The main purpose of the transport layer is to provide services which are efficient, reliable and cost-effecti

Problem a) Give three reasons why traditional Network Design approach is less appropriate for many of today's networks? b) The network requires of users are organized into m

a) Wireless local area network (WLAN) technologies constitute a fast-growing market introducing the flexibility of wireless access into office, home, or production environments. G

The Cost Benefit Analysis (CBA) Formula CBA determines that whether the control alternative being evaluated is worth cost incurred to control vulnerability or not. CBA easily ca