Using icmp reachability,trace a route,path mtu, Computer Network Security

 

USING ICMP TO TEST REACHABILITY:

 ICMP can also be used to test several tools. An Internet host A, is reachable from another host B, if data packets can be send from A to B. Ping function tests reachability. It transmit datagram from B to A, that sends back to B. it uses ICMP echo reply and echo request messages. Internet layer added code to reply to incoming ICMP echo request messages.


USING ICMP TO TRACE A ROUTE:

 List of all routers on path from A to B is known the route from A to B. The intermediate routers transmit ICMP time exceeded message to the host and receiver transmits an ICMP destination unreachable message to the host.

 Tracert (Windows version) gives ICMP echo messages with increasing TTL. Router that decrements TTL to 0 provides ICMP time exceeded message, with router's address as host address. First, with TTL 1, gets to first router, which discards and transmits time exceeded message. Next, with TTL 2 goes through first router to second router. It continues until an ICMP echo reply data packet from destination is received.

USING ICMP FOR PATH MTU:

 Fragmentation should be removed. Source can manage outgoing datagrams to avoid fragmentation. Source calculates path MTU- smallest network MTU on path from host to destination. Source probes path using IP packet message with don't fragment flag. Router acts with ICMP fragmentation needed message. Source transmits smaller probes until destination reached.

 

 

Posted Date: 8/1/2012 9:33:58 AM | Location : United States







Related Discussions:- Using icmp reachability,trace a route,path mtu, Assignment Help, Ask Question on Using icmp reachability,trace a route,path mtu, Get Answer, Expert's Help, Using icmp reachability,trace a route,path mtu Discussions

Write discussion on Using icmp reachability,trace a route,path mtu
Your posts are moderated
Related Questions
GROWTH OF LAN TECHNOLOGY The production of shared communication channels (LANs) started in 1960s and early 1970. The basic idea behind was to reduce the number of connectio

hi have a look and tell me if u can do it. if u can do Q1then i will allow u to do Q2

QUESTION: a) Below is a capture of an Ethernet II frame which has an IPv4 packet and a segment. Provide the source MAC address in hexadecimal; the source IP address, the length

QUESTION 1 Risk analysis helps companies prioritize their risks and shows management the amount of money that should be applied to protecting against those risks in a sensib

(a) Using the extended Euclidean algorithm, find the multiplicative inverse of 504 mod 67. (b) Decrypt the following ciphertext, which has been encrypted using Caesar cipher:

Attacks on Cryptosystems Attacks are attempts to achieve unauthorized access to secure communications have characteristically used brute force attacks. Attacker may alternatively

(a) Cost allocation mechanisms are important when it comes to establishing other aspects of inter-firm compensations and how these are transferred to the users. There are two pri

how would land elevation have canged if coronado had traveled 150 miles due west from what is today arizona instead of west toward new mexico

Implementing an effective online authentication scheme in practice faces many challenges. Systems with highly sensitive data often require multifactor authentication. But, requirin

what are the participant of marketing channal?