Error reporting mechanism (icmp), Computer Network Security

ERROR REPORTING MECHANISM (ICMP)

INTRODUCTION:

 IP gives best-effort delivery. Delivery causes can be ignored; datagrams may be 'dropped on the ground'. Internet Control Message Protocol gives error-reporting mechanism.

 

BEST-EFFORT ERROR AND SEMANTICS DETECTION:

Internet layer can check a variety of errors: e.g.

  • Checksum
  • TTL expires
  • No route to receiver network.
  • Can't deliver to receiver host.

 

Internet layer discards datagrams with causes.

INTERNET CONTROL MESSAGE PROTOCOL:

Some errors can be noticed.  Router transmits message back to host in datagram. Message has information about problem. It is included in IP datagram.

TYPES OF MESSAGES:

Internet control Message Protocol (ICMP) describes error and informational messages. These are shown as follows:

1. ERROR MESSAGES:

These are as given:

  • Source quench
  • Time exceeded
  • Destination unreachable
  • Redirect
  • Fragmentation required

2. INFORMATIONAL MESSAGES:

These are as given:

  • Echo request/reply
  • Address mask request /reply
  • Router discovery

ICMP MESSAGE TRANSPORT:

 ICMP message transport is performed upon by getting ICMP included in IP. This is given in the figure below:

 

1981_ERROR REPORTING MECHANISM (ICMP).png

Posted Date: 8/1/2012 9:31:36 AM | Location : United States







Related Discussions:- Error reporting mechanism (icmp), Assignment Help, Ask Question on Error reporting mechanism (icmp), Get Answer, Expert's Help, Error reporting mechanism (icmp) Discussions

Write discussion on Error reporting mechanism (icmp)
Your posts are moderated
Related Questions
Question: (a) Describe how IPSec provides data source authentication. (b) Which protocol can be used to provide limited traffic analysis confidentiality? Why is it "limite

LOCAL TALK Apple discovered the LAN technology that uses bus topology. Its interface is added with all Macintosh computers. It has very low speed i.e. 230.4Kbps. Also it is ch

Data Classification and Management Corporate and military organizations use a several of classification schemes. Information owners are responsible for classifying information a

how can you enter the ASVAB practice test on line?

COMPONENTS OF AN INFORMATION SYSTEM The components of an information system are software, data, hardware, people, procedures and Networks. These 6 components are critical to ena

a) Define the term "Enterprise Network". b) Briefly discuss the similarity and differences between a switch and a router. c) A company XYZ has been renting the 1 st Floor of

Hardware, Software, and Network Asset Identification What information attributes to track is dependent on: •    Requires of organization/risk management efforts •    Management

Problem a) Give the destination IP address, upper layer protocol, TTL in decimal and header checksum in hexadecimal; the source port number and the destination port number in deci

Question: (a) Distinguish between a mobile agent "state" and "code". (b) Differentiate between "weak" and "strong" mobility. (c) Mobile agent systems are known to have

discuss the merits and demerits of computers freezing