Error reporting mechanism (icmp), Computer Network Security

ERROR REPORTING MECHANISM (ICMP)

INTRODUCTION:

 IP gives best-effort delivery. Delivery causes can be ignored; datagrams may be 'dropped on the ground'. Internet Control Message Protocol gives error-reporting mechanism.

 

BEST-EFFORT ERROR AND SEMANTICS DETECTION:

Internet layer can check a variety of errors: e.g.

  • Checksum
  • TTL expires
  • No route to receiver network.
  • Can't deliver to receiver host.

 

Internet layer discards datagrams with causes.

INTERNET CONTROL MESSAGE PROTOCOL:

Some errors can be noticed.  Router transmits message back to host in datagram. Message has information about problem. It is included in IP datagram.

TYPES OF MESSAGES:

Internet control Message Protocol (ICMP) describes error and informational messages. These are shown as follows:

1. ERROR MESSAGES:

These are as given:

  • Source quench
  • Time exceeded
  • Destination unreachable
  • Redirect
  • Fragmentation required

2. INFORMATIONAL MESSAGES:

These are as given:

  • Echo request/reply
  • Address mask request /reply
  • Router discovery

ICMP MESSAGE TRANSPORT:

 ICMP message transport is performed upon by getting ICMP included in IP. This is given in the figure below:

 

1981_ERROR REPORTING MECHANISM (ICMP).png

Posted Date: 8/1/2012 9:31:36 AM | Location : United States







Related Discussions:- Error reporting mechanism (icmp), Assignment Help, Ask Question on Error reporting mechanism (icmp), Get Answer, Expert's Help, Error reporting mechanism (icmp) Discussions

Write discussion on Error reporting mechanism (icmp)
Your posts are moderated
Related Questions
(a) Explain the importance of the Euler Totient function in Cryptography. Calculate Euler Totient function value, φ(1280). (b) Explain the role of the Authentication Server (

Let me know the details of protocol tcp/ip

Problem (a) IT Service Support within the ITIL framework is divided in a number of processes. Compare and contrast the following processes: i. Incident Management and Problem M

Asymmetric Encryption Asymmetric encryption method makes use of two different but related keys and either key can be used to encrypt or decrypt the message. This method is freque

Threat Identification After identifying and performing a primary classification of an organization’s information assets, the analysis phase moves onto an examination of threats

Problem (a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. The second screen capture is from the data portion of the frame.

QUESTION (a) What do you understand by a VLAN? Provide one advantage of using a VLAN. (b) What is a trunk port in a VLAN? (c) A VLAN will be created using one or more

TCP and UDP End-to-end delivery application is connection less. The basic function of connectionless service are as given: It adds extension of LAN abstraction. It has simp

IP DATAGRAM Various options can be included to IP header, e.g., source route, record route and timestamp. Header with no function has H. LEN field value 5; data starts immedia

TRANSPORT PROTOCOLS: Give application-to-application communication. Require extended addressing mechanisms to check applications. Are known end-to-end communicatio