Error reporting mechanism (icmp), Computer Network Security

Assignment Help:

ERROR REPORTING MECHANISM (ICMP)

INTRODUCTION:

 IP gives best-effort delivery. Delivery causes can be ignored; datagrams may be 'dropped on the ground'. Internet Control Message Protocol gives error-reporting mechanism.

 

BEST-EFFORT ERROR AND SEMANTICS DETECTION:

Internet layer can check a variety of errors: e.g.

  • Checksum
  • TTL expires
  • No route to receiver network.
  • Can't deliver to receiver host.

 

Internet layer discards datagrams with causes.

INTERNET CONTROL MESSAGE PROTOCOL:

Some errors can be noticed.  Router transmits message back to host in datagram. Message has information about problem. It is included in IP datagram.

TYPES OF MESSAGES:

Internet control Message Protocol (ICMP) describes error and informational messages. These are shown as follows:

1. ERROR MESSAGES:

These are as given:

  • Source quench
  • Time exceeded
  • Destination unreachable
  • Redirect
  • Fragmentation required

2. INFORMATIONAL MESSAGES:

These are as given:

  • Echo request/reply
  • Address mask request /reply
  • Router discovery

ICMP MESSAGE TRANSPORT:

 ICMP message transport is performed upon by getting ICMP included in IP. This is given in the figure below:

 

1981_ERROR REPORTING MECHANISM (ICMP).png


Related Discussions:- Error reporting mechanism (icmp)

Vigenere Cipher, What key which if used to encrypt the ciphertext again wou...

What key which if used to encrypt the ciphertext again would give back the plaintext (i.e. key is a weak key)? Define a formula for identifying weak keys for the cipher below (

The Security Systems Development Life Cycle (SecSDLCtle.., #Under what circ...

#Under what circumstances would the use of a SecSDLC be more appropriate than an SDLC?

Ip datagram format, IP DATAGRAM SIZE:  Datagrams may have different si...

IP DATAGRAM SIZE:  Datagrams may have different sizes i.e. Header area is generally fixed (20 octets) but can have various options. Data area may contain between 1 octet and 6

Introduction to cryptography, INTRODUCTION TO CRYPTOGRAPHY Cryptography...

INTRODUCTION TO CRYPTOGRAPHY Cryptography The word cryptography is derived from Greek words kryptos, which means hidden and graphein, meaning to write, this is the process of

What is authentication? explain authentication protocols, What is Authentic...

What is Authentication/confirmation?  How it is different from  the Authorization/approval?  Explain in brief different authentication protocols along with their merits and demerit

Securing the network using a packet filter firewall, 1. Network Design ...

1. Network Design Design your network giving appropriate IP addresses for your hosts. Provide a topology and table showing your addressing scheme. 2. F i re wall po

Explain the rsa algorithm, Question: (a) What is the minimum length of...

Question: (a) What is the minimum length of a password that could be considered to be "strong" in the context of today's computing power? (b) The security of a PIN system,

How Ethical are Major Internet Companies?, Ask question #MHow Ethical are M...

Ask question #MHow Ethical are Major Internet Companies?

Important network security services, Question: (a) Consider that you en...

Question: (a) Consider that you enter the given URL in the address bar of a popular web client and that both the client and server accepts HTTP version 1.1. i. What can be t

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd