Error reporting mechanism (icmp), Computer Network Security

ERROR REPORTING MECHANISM (ICMP)

INTRODUCTION:

 IP gives best-effort delivery. Delivery causes can be ignored; datagrams may be 'dropped on the ground'. Internet Control Message Protocol gives error-reporting mechanism.

 

BEST-EFFORT ERROR AND SEMANTICS DETECTION:

Internet layer can check a variety of errors: e.g.

  • Checksum
  • TTL expires
  • No route to receiver network.
  • Can't deliver to receiver host.

 

Internet layer discards datagrams with causes.

INTERNET CONTROL MESSAGE PROTOCOL:

Some errors can be noticed.  Router transmits message back to host in datagram. Message has information about problem. It is included in IP datagram.

TYPES OF MESSAGES:

Internet control Message Protocol (ICMP) describes error and informational messages. These are shown as follows:

1. ERROR MESSAGES:

These are as given:

  • Source quench
  • Time exceeded
  • Destination unreachable
  • Redirect
  • Fragmentation required

2. INFORMATIONAL MESSAGES:

These are as given:

  • Echo request/reply
  • Address mask request /reply
  • Router discovery

ICMP MESSAGE TRANSPORT:

 ICMP message transport is performed upon by getting ICMP included in IP. This is given in the figure below:

 

1981_ERROR REPORTING MECHANISM (ICMP).png

Posted Date: 8/1/2012 9:31:36 AM | Location : United States







Related Discussions:- Error reporting mechanism (icmp), Assignment Help, Ask Question on Error reporting mechanism (icmp), Get Answer, Expert's Help, Error reporting mechanism (icmp) Discussions

Write discussion on Error reporting mechanism (icmp)
Your posts are moderated
Related Questions
Digital Signatures Digital Signatures are encrypted messages which can be proven mathematically to be authentic. These are created in response to rising requirement to verify in

According to the case, The EZ Company introduced a new technology, focusing on the principles of informationintegration and visualization. The company started negotiatinga saleto a

Question : a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. Give the source MAC address for the frame in hexadecimal; the source I

(a) (i) Bob has public RSA key (n = 77, e = 7). Show that Bob's private key is (d = 43). (ii) Alice wants to send the message m = 13 to Bob. She encrypts the message usi

IPV6 BASE HEADER FORMAT: It has less information than IPV4 message header. Next header shows to first extension message header. Flow label is partitioned into a TRAFFIC CLASS

Question : (a) There are two approaches for providing confidentiality for packets in a network using symmetric encryption: End-to-End Encryption and Link Encryption. State wh

Question : (a) State whether the following statement is FALSE or TRUE: It is always better to have various access points to the Internet so that if a hacker takes one down you

Write down the short notes on VTR.  Communication between different types of the equipment and software is made possible by making use of the networks. Full-screen text editor is s

QUESTION (a) One of the biggest drawbacks that GNS3 has is that it supports only the IOS images of routers. This means that users cannot emulate Cisco switches. Suggest two sol

Question: a) There are two basic approaches to dealing with errors in the presence of pipelining. One way is Go-Back-N and the other strategy is Selective Repeat. i. Explain