SlideShare ist ein Scribd-Unternehmen logo
1 von 14
By
C.Rajeswari,
M.Sc(info.tech),
Nadar Saraswathi College of Arts and Science,
Theni.
 The IP protocol also lacks a mechanism for host and management queries.
 The Internet Control Message Protocol version 4 (ICMPv4) bas been
designed to compensate for the above two deficiencies.
 It is a companion to the IP protocol ICMP itself is a network-layer protocol.
 Its message are not passed directly to the data-link layer as would be
expected.
 The message are first encapsulated inside IP datagrams before going to the
lower layer.
 ICMP messages are divided into broad categories: error-reporting messages
and query messages.
 The error-reporting message report problems that a router or a host may
encounter when it processes an IP packet.
 An ICMP message has an 8-byte header and a variable-size data section.
Although the general format of the header is different for each message
type, the first 4 bytes are common to all.
Error Reporting Messages
 IP is an unreliable protocol, one of the main responsibilities of ICMP
is to report some errors that may occur during the processing of the
IP datagram. Error correction is left to the higher-level protocols.
 Error messages are always sent to the original source because the
only information available in the datagram about the route is the
source and destination IP addresses.
 The following are important points about ICMP error message:
 No ICMP error message will be generated in response to datagram carrying
an ICMP error message.
 No ICMP error message will be generated for a fragmented datagram that is
not the first fragment.
 No ICMP error message will be generated for a datagram having a multicast
address.
 No ICMP error message will be generated for a datagram having a special
address such as 127.0.0.0 or 0.0.0.0.
Destination Unreachable
 The most widely used error message is the destination unreachable.
 This message uses different codes to define the type of error message and
the reason why a datagram has not reached its final destination.
Source Quench
 Another error message is called the source quench message.
 Which informs the sender that the network has encountered congestion and
the datagram has been dropped;
Redirection Message
 The redirection message is used when the source uses a wrong router to
send out its message.
 The time-to-live (TTL) field in the IP datagram and explained that it
prevents a datagram from being aimlessly circulated in the internet.
Parameter Problem
 A parameter problem message can be sent when either there is a problem in
the header of a datagram or some options are missing or cannot be
interpreted.
Query Message
 query message in ICMP can be used independently without relation to an IP
datagram.
 The echo request and the echo reply pair of messages are used by a host or
a router to test the liveliness of another host or router.
 The timestamp request and the timestamp reply pair of messages are used to
find the round-trip time between two devices or to check whether the clocks
in two devices are synchronized.
Deprecated Message
 Three pairs of message are declared obsolete by IETF:
 Information request and replay messages are not used today because their
duties are done by the Address Resolution Protocol(ARP).
 Address mask request and replay messages are not used today because their
duties are done by the Dynamic Host Configuration Protocol(DHCP).
 Router solicitation and advertisement messages are not used today because
their duties are done by the Dynamic Host Configuration Protocol(DHCP).
 There are several tools that can be used in the internet for debugging.
 We can determine the viability of a host or router.
 We can trace the router of a packet.
 We introduce two tools that use ICMP for debugging: ping and traceroute.
Ping:
 We can use the ping program to find if a host is alive and responding. We
use ping here to see how it uses ICMP packets.
 The source host sends ICMP echo-request message; the destination, if alive,
responds with ICMP echo-reply messages.
 The ping program sets the identifier field in the echo-request and echo-reply
message and starts the sequence number from 0; this number is incremented
by 1 each time a new message is sent.
 It subtracts the arrival time from the departure time to get the round-trip
time(RTT).
Traceroute or Tracert
 The traceroute program in UNIX or tracert in windows can be used to trace
the path of a packet from a source to the destination.
 It can find the IP addresses of all the routers that are visited along the path.
Traceroute
 The traceroute program is different from the ping program
 The ping program gets help from two query message; the traceroute
program gets help from two error-reporting message; time-exceeded and
destination-unreachable.
 The traceroute application program is encapsulated in a UDP user datagram
Tracert
 The tracert program in windows behaves differently.
 The tracert message are encapsulated directly in IP datagrams.
 In ICMP the checksum is calculated over the entire message(header and
data).
 Checksum calculation for a simple echo-request message.
 We randomly chose the identifier to be 1 and the sequence number to be 9.
 The message is divided into 16-bit(2-byte) words.
 The words are added and the sum is complemented
 The sender can put this value in the checksum field.
ICMPV4

Weitere ähnliche Inhalte

Was ist angesagt? (20)

TCP/IP and UDP protocols
TCP/IP and UDP protocolsTCP/IP and UDP protocols
TCP/IP and UDP protocols
 
ICMP
ICMP ICMP
ICMP
 
Icmp
IcmpIcmp
Icmp
 
5. icmp
5. icmp5. icmp
5. icmp
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
Icmp V4 And Icmp V6
Icmp V4 And Icmp V6Icmp V4 And Icmp V6
Icmp V4 And Icmp V6
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
SMTP Simple Mail Transfer Protocol
SMTP Simple Mail Transfer ProtocolSMTP Simple Mail Transfer Protocol
SMTP Simple Mail Transfer Protocol
 
ICMP
ICMPICMP
ICMP
 
Tcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerTcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication header
 
Introduction of tcp, ip & udp
Introduction of tcp, ip & udpIntroduction of tcp, ip & udp
Introduction of tcp, ip & udp
 
Final networks lab manual
Final networks lab manualFinal networks lab manual
Final networks lab manual
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
 
Addressing
AddressingAddressing
Addressing
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
 
Transport layer
Transport layer Transport layer
Transport layer
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 

Ähnlich wie ICMPV4

Ch 19 Network-layer protocols - section 2
Ch 19   Network-layer protocols - section 2Ch 19   Network-layer protocols - section 2
Ch 19 Network-layer protocols - section 2Hossam El-Deen Osama
 
Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)Tutun Juhana
 
Network Layer Part 6
Network Layer Part 6Network Layer Part 6
Network Layer Part 6Tutun Juhana
 
IP has no mechanism for error reporting or error-correcting. ICMPv4 .pdf
IP has no mechanism for error reporting or error-correcting. ICMPv4 .pdfIP has no mechanism for error reporting or error-correcting. ICMPv4 .pdf
IP has no mechanism for error reporting or error-correcting. ICMPv4 .pdfrishabjain5053
 
How does ping_work_style_1_gv
How does ping_work_style_1_gvHow does ping_work_style_1_gv
How does ping_work_style_1_gvvgy_a
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.pptssuserf7cd2b
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsSerious_SamSoul
 
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxWireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxalanfhall8953
 
Report on ip addresses
Report on ip addressesReport on ip addresses
Report on ip addressesAmandeep Kaur
 
tcpheader-151221111244.pdf
tcpheader-151221111244.pdftcpheader-151221111244.pdf
tcpheader-151221111244.pdfEnumulaBhargava1
 
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdfBIT DURG
 

Ähnlich wie ICMPV4 (20)

Ch 19 Network-layer protocols - section 2
Ch 19   Network-layer protocols - section 2Ch 19   Network-layer protocols - section 2
Ch 19 Network-layer protocols - section 2
 
Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)
 
Network Layer Part 6
Network Layer Part 6Network Layer Part 6
Network Layer Part 6
 
IP has no mechanism for error reporting or error-correcting. ICMPv4 .pdf
IP has no mechanism for error reporting or error-correcting. ICMPv4 .pdfIP has no mechanism for error reporting or error-correcting. ICMPv4 .pdf
IP has no mechanism for error reporting or error-correcting. ICMPv4 .pdf
 
How does ping_work_style_1_gv
How does ping_work_style_1_gvHow does ping_work_style_1_gv
How does ping_work_style_1_gv
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
Icmp
IcmpIcmp
Icmp
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignments
 
New Creators
New CreatorsNew Creators
New Creators
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
 
Ip and icmp
Ip and icmpIp and icmp
Ip and icmp
 
Nnnnnn
NnnnnnNnnnnn
Nnnnnn
 
ICMP.ppt
ICMP.pptICMP.ppt
ICMP.ppt
 
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxWireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
 
Lecture 04
Lecture 04Lecture 04
Lecture 04
 
IP Address
IP AddressIP Address
IP Address
 
Report on ip addresses
Report on ip addressesReport on ip addresses
Report on ip addresses
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
 
tcpheader-151221111244.pdf
tcpheader-151221111244.pdftcpheader-151221111244.pdf
tcpheader-151221111244.pdf
 
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdf
 

Mehr von rajshreemuthiah (20)

oracle
oracleoracle
oracle
 
quality
qualityquality
quality
 
bigdata
bigdatabigdata
bigdata
 
polymorphism
polymorphismpolymorphism
polymorphism
 
solutions and understanding text analytics
solutions and understanding text analyticssolutions and understanding text analytics
solutions and understanding text analytics
 
interface
interfaceinterface
interface
 
Testing &ampdebugging
Testing &ampdebuggingTesting &ampdebugging
Testing &ampdebugging
 
concurrency control
concurrency controlconcurrency control
concurrency control
 
Education
EducationEducation
Education
 
Formal verification
Formal verificationFormal verification
Formal verification
 
Transaction management
Transaction management Transaction management
Transaction management
 
Multi thread
Multi threadMulti thread
Multi thread
 
System testing
System testingSystem testing
System testing
 
software maintenance
software maintenancesoftware maintenance
software maintenance
 
exception handling
exception handlingexception handling
exception handling
 
e governance
e governancee governance
e governance
 
recovery management
recovery managementrecovery management
recovery management
 
Implementing polymorphism
Implementing polymorphismImplementing polymorphism
Implementing polymorphism
 
Buffer managements
Buffer managementsBuffer managements
Buffer managements
 
os linux
os linuxos linux
os linux
 

Kürzlich hochgeladen

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Kürzlich hochgeladen (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

ICMPV4

  • 2.  The IP protocol also lacks a mechanism for host and management queries.  The Internet Control Message Protocol version 4 (ICMPv4) bas been designed to compensate for the above two deficiencies.  It is a companion to the IP protocol ICMP itself is a network-layer protocol.  Its message are not passed directly to the data-link layer as would be expected.  The message are first encapsulated inside IP datagrams before going to the lower layer.
  • 3.  ICMP messages are divided into broad categories: error-reporting messages and query messages.  The error-reporting message report problems that a router or a host may encounter when it processes an IP packet.  An ICMP message has an 8-byte header and a variable-size data section. Although the general format of the header is different for each message type, the first 4 bytes are common to all.
  • 4. Error Reporting Messages  IP is an unreliable protocol, one of the main responsibilities of ICMP is to report some errors that may occur during the processing of the IP datagram. Error correction is left to the higher-level protocols.  Error messages are always sent to the original source because the only information available in the datagram about the route is the source and destination IP addresses.  The following are important points about ICMP error message:
  • 5.  No ICMP error message will be generated in response to datagram carrying an ICMP error message.  No ICMP error message will be generated for a fragmented datagram that is not the first fragment.  No ICMP error message will be generated for a datagram having a multicast address.  No ICMP error message will be generated for a datagram having a special address such as 127.0.0.0 or 0.0.0.0.
  • 6. Destination Unreachable  The most widely used error message is the destination unreachable.  This message uses different codes to define the type of error message and the reason why a datagram has not reached its final destination. Source Quench  Another error message is called the source quench message.  Which informs the sender that the network has encountered congestion and the datagram has been dropped;
  • 7. Redirection Message  The redirection message is used when the source uses a wrong router to send out its message.  The time-to-live (TTL) field in the IP datagram and explained that it prevents a datagram from being aimlessly circulated in the internet. Parameter Problem  A parameter problem message can be sent when either there is a problem in the header of a datagram or some options are missing or cannot be interpreted.
  • 8. Query Message  query message in ICMP can be used independently without relation to an IP datagram.  The echo request and the echo reply pair of messages are used by a host or a router to test the liveliness of another host or router.  The timestamp request and the timestamp reply pair of messages are used to find the round-trip time between two devices or to check whether the clocks in two devices are synchronized.
  • 9. Deprecated Message  Three pairs of message are declared obsolete by IETF:  Information request and replay messages are not used today because their duties are done by the Address Resolution Protocol(ARP).  Address mask request and replay messages are not used today because their duties are done by the Dynamic Host Configuration Protocol(DHCP).  Router solicitation and advertisement messages are not used today because their duties are done by the Dynamic Host Configuration Protocol(DHCP).
  • 10.  There are several tools that can be used in the internet for debugging.  We can determine the viability of a host or router.  We can trace the router of a packet.  We introduce two tools that use ICMP for debugging: ping and traceroute. Ping:  We can use the ping program to find if a host is alive and responding. We use ping here to see how it uses ICMP packets.  The source host sends ICMP echo-request message; the destination, if alive, responds with ICMP echo-reply messages.
  • 11.  The ping program sets the identifier field in the echo-request and echo-reply message and starts the sequence number from 0; this number is incremented by 1 each time a new message is sent.  It subtracts the arrival time from the departure time to get the round-trip time(RTT). Traceroute or Tracert  The traceroute program in UNIX or tracert in windows can be used to trace the path of a packet from a source to the destination.  It can find the IP addresses of all the routers that are visited along the path.
  • 12. Traceroute  The traceroute program is different from the ping program  The ping program gets help from two query message; the traceroute program gets help from two error-reporting message; time-exceeded and destination-unreachable.  The traceroute application program is encapsulated in a UDP user datagram Tracert  The tracert program in windows behaves differently.  The tracert message are encapsulated directly in IP datagrams.
  • 13.  In ICMP the checksum is calculated over the entire message(header and data).  Checksum calculation for a simple echo-request message.  We randomly chose the identifier to be 1 and the sequence number to be 9.  The message is divided into 16-bit(2-byte) words.  The words are added and the sum is complemented  The sender can put this value in the checksum field.