0% found this document useful (0 votes)
11 views4 pages

ICMP Query Message Notes

Internet Control Message Protocol ICMP Notes

Uploaded by

sthapana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
11 views4 pages

ICMP Query Message Notes

Internet Control Message Protocol ICMP Notes

Uploaded by

sthapana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 4
443 Query 1, Messages (ICMPv4) : The ICMP can diagnose some of the Helwork problems, This is in addition with the error reporting feature. Such a diagnosis is done through the'query messages. . ges isa group of five ctferent pairs of The query messai messages as shown in Fig. 1.13.1. _—+ 1. Echo requost and reply |_+ 2. Time stamp request and reply Query —__+ 3, addross mask request and reply |» 4, Router solicitation and advertisement + 5. Information request and reply messages (G-2112) Fig. 1.13.1 : Query messages However out of these five pairs of messages, only two pairs are being used today. They are : 1. Echo request and reply. 2. Timestamp request and reply. Let us discuss them one by one. 13.1 Echo Request and Reply : This pair of query messages has been designed for the diagnostic purpose. This pair of messages is utilized by ‘the network managers and users for identifying the network problems. This pair of query Messages would determine whether the two given systems (either hosts or routers) can communicate with each other or'not. The communication will take place as follows : 1. Ahost or router sends the echo-request message to another host or router it wants to communicate to. 2 The host or router which receives the echo request message will create an echo-reply message and sends it back to the original sender. © Scanned with OKEN Scanner ~ We can also use the determine if the 1p not echo-request ech, I reply pair level communication ic Pot * 55 present or ~The network managers can use th echo reply pair of messages to eh, P protocol "© €cho request ang 'eck the operation of = Aost can also use this message pair to host is reachable oF not. At the users fo by invoking the packet Internet (ping). See if another ve this s done oper command = Nowa days a version of pin most sens which can see sora ing of echo-request and echo-reply messages for providing statistical information. = It is also possible to check whether a node is functioning properly or not with the help of the echo- request echo reply pair of messages. The format of the echo request echo reply pair of messages is as shown in Fig, 1132. fH 8 bts oe 8 bis ote 18 bts wt a eet | TPO Bor O]_Code ro ‘checksum | Tpeot Tsentiior Sequonce numbor Opiional data Sent by the request message, ropoated by the reply message (G-2113) Fig, 1.13.2: Echo request and echo reply messages ~ Infig, 1.132, the protocol does not formally define the identifier and sequence number fields. Therefore the sender can use them in an arbitrary manner. 1.43.2 Timestamp Request and Reply : ~ This pair of messages can be used by the hosts and routers to find out the round trip time that an IP datagram needs to travel between them. = Itcan also be used for synchronizing the clock signals used in the two machines (hosts or routers). ~ Fig. 1.133 shows the format of these two messages. fe B bits se 8 bits —o}e——— 16 bits ——4 Typo 19: S Rea; [Tipertaorla] Code 6 Checksum Typo 14 Identifier “Sequence number Reply ‘Original timestamp Receive timestamp Transmit imesiamp (G-2114) Fig. 1.13.3 : Formiat of timestamp request and 437 ‘midnight in Univers sa time, Eventhough, the 32 bi between 0 and 4,294: case can have the = 24 x 60x 60 1000, Wt field can represent » number ‘967.295 but a timestamp in this ‘maximum value of 86,400,000 ‘The timestamp request message is created by the SOUrCE. I fils the original timestamp field at depenure time, and fil the other two timestamp fields wil zeros The timestamp reply ‘Message is created by the destination host. The original ‘timestamp value from the timestamp request message is copied as itis into the original timestamp field in the timestamp reply message, by the destination, — The destination then fills up the receive timestamp field by the time at which the request was received. - At the end the destination fils up the transmit timestamp field with the departure time of the reply message. ‘Computation of one way or round trip time (RTT) : = We can use the pair of timestamp messages to compute the one way or RTT ic. the time required by the datagram to travel from source to destination and then come back to source again, as follows inal timestamp. © Sending time = receive timestamp - Receiving time = returned time ~ transmit timestamp. Rount trip time = sending time + receiving time. = If we want the calculations of the sending time and receiving time to be accurate, then the two clocks in the source and destination computers should be synchronized. = But the calculation of RTT will be correct even’ if the clocks at the source and destination machines are not synchronized. = We can calculate the one way time duration by dividing the RTT by two. 4.13.3 Deprecated Messages : IETF has declared the following three pairs of query messages as obsolete : timestamp reply messages 1. _ Information request and reply messages. y TechKnowledgi © Scanned with OKEN Scanner 13 ‘ACN (Comp. ‘Sem S/MSBTE) ——$——— 2. Address mask request and reply messages: 3. Router solicitation and advertisement. 4. The Information request and reply messages : ~ These messages are not used now a days becouse the Address Resolution Protocol (ARP) is. doing their duties, 2, Address mask requost and roply : ~The IP address of a host contains a network address, subnet address and host iden — A bhost may know its full IP address but may not know it is divided into three parts mentioned above, ~ _ Soiit can send an address mask request message to the router. The router then sends back the address ‘mask reply message. ~ These messages are not being used today because their duties are done by the Dynamic Host Configuration Protocol (DHCP), 3. Router solicitation and advertisement : - A host that wants to send data to 2 host on ‘another network must know the address of routers Connected to its own network, ~ In such situations the router solicitation and advertisement messages can help. = A host can broadcast or multicast a router solicitation message. The routers receiving this message can broadcast their routing information Using the router advertisement message. These messages are not being used today because their duties are done by the DHCP. 1.13.4 Checksum : ~ Earlier we have discussed the concept of checksum. In ICMP, the entire message (including the header and data) is considered for calculation of checksum, Checksum calculation : ~ The checksum calculation is done at the sending end by following the steps given below: 1. Set the checksum field to zero, 2. Calculate the sum of all the 26 bit words including header and data. © —— © Scanned with OKEN Scanner Network Layer & Pro, Store}. 4-38 3, Obtain the checksum by complementing the wd calculated in step 2. 4,. Store the checksum.in the checksum field. Checksum testing : The following steps are followed by the receiver using 1's complement arithmetic : Calculate the sum of all words (header and data). 1.. 2. Complement the sum calculated in step 1. 3. Accept the message if the result obtained in step 2 is 16 zeros. Otherwise the message is rejected. © scanned with OKEN Scanner

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy