0% found this document useful (0 votes)
38 views11 pages

CN Unit Test

Uploaded by

kavi06doc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views11 pages

CN Unit Test

Uploaded by

kavi06doc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

3.

40
3.6.2 ICMPV4
IPV4 has no
mechanism,
Error reporting and correcting
Mechanism for host and management queries,
deficiencies,
1CMP designed to overcome above two
ICMP is a network layer protocol, an integral part of IP.No TCP
numbers are associated with ICMP packets since these are
layer above. associated with
ICMP is an error reporting protocol, that sends error messages to so
Error message includes the information about non delivery of packet
ICMP is not in regular use of end users, His used by network
troubleshooting mechanism that includes ping and traceroute. adminisr
ICMP packets are IP packets with ICMP in the IP data
portion.
ICMP message contains entire IP header of original payload, thus helps to
packet failed during transmission.
Messages :
There are two broad categories of ICMP messages.
(i) Error reporting messages
(ii) Query messages
An ICMP message includes header of 8byte and variable data section.
(i) Error reporting messages :
ICMP can report errors but does not correct it.
Error messages are sent only to the original source.
ICMP does not generate error message for (rules)
this-host multicast address or special address (which
does not know its own address)
" datagram carrying error message.
" fragmented datagram,that is not the first datagram.
341
NetworkLayer
8 bits 8 bits 16 bits

Type Code Checksum


Rest of Header Encapsulated
Error-reporting
Data / Payload message

ICMP Error Message Format


Figure
Common error reporting message type
and code are "
03-Destination unreachable (code 0 to 15)

04- Source quench (only code 0)


05 - Redirection (codes 0 to 3)
1|-Time exceeded (codes and 1)
12- Parameter Problem (codes 0 and 1)

Data Section in error message finds the original packet that has error.

Destination Unreachable

Its type = 3, it use different codes between 0 to 15. Specifies the reason for n
delivery of message to the destination.
Code 0 - Host unreachable.

Example : Access web page using HTTP protocol but server is down.
Source Quench :

Its type =4. This error message informs sender about the congestion in net
Redirection Message:
Its type = 51sends error message to source and informs that the sender ha
Wrong router to route the message.
Parameter problem :
Its type = 12, specifies any error in header or some options are missing
(Gi) Query Messages:
Query message is encapsulated in adatagram, is used to check liveline
anetwork.
3.42

There is a pair of query message


echo request
Computsr
echo reply
8 bits 8 bits 16 bits

Code Checksum
Type
ldentifier Sequence number

Data / Payload

Figure Query Messages


Type and code values of Query messages are 08 and 00 -Echo
(only code 0) 13 and 14- Timestamp request and reply (only code 0). request an
Echo request and Echo reply
It tests the existence period of host or router.
Time stamp request and time stamp reply
It is used to find RTT (Round Trip Time) between two devices to dhi
synchronisation.

Message obsolete in ICMPV4 are:


Information request and reply (ARP)
Address mask request and reply (DHCP)
Router solicitation and advertisement (DHCP)

Debugging tools :
ICMP uses the following as a debugging tools.
() Ping
(ii) Traceroute
() Ping :
It is used to find existence of host in a network.
Role of ping in ICMP is corresponding to echo-request and echo reply me
NetworkLayer

Ping program sets


a
identifier field and sets starting 3A3
increments each time,whenever data being transmitted from sequence number as 0 and
Itcalculates round trip time.
source to
destination.
(ii) Traceroute:
Traceroute is a utility diagnostic command that
measures transit delay of packet. displays path chosen by router and
Ping is a utility command that tells
is reachable and time it take to
send
whether the specified server
and
Traceroute finds the exact route to receive data from
to reach each hop. reach destination and timeserver.
taken
Traceroute program sends (n
+1) messages for n routers and (n
reporting message. +1) ICMP error
Source
Routes 1
R2 R3
Destination

TTL:1
Echo
Request
Time
Exceeded

TTL:2
Echo
Request
Time
Exceeded
TTL:3
Echo
Request
Time
Exceeded
TTL:4
Echo
Request
Destination
Unreachable
Time
Time
Figure ICMPV4 in traceroute
3,44

Tracert :
Tracert messages are directly encapsulateddin 1P
datagrams.
Traceroute and tracert both commands are the sarme
traceroute available in Unix OS and tracert in
OS. Windows NT
In ICMP checksum is calculated over entire message
3.7 IPV6 ADDRESSING including header
IPV6 resolves the small size address space of IPV6. It has
address space. 12% bit
IPV6 has colon-hexadecimal representation. These are
cach 2 bytes. divided
Example :
ABCD:EF11:3423 : 8967 :ABCF:C201:5432:E024
IPV6 has 3 addressing methods
Unicast address
Multicast address
Anycast address
Unicast address identifies single network interface. Multicast addes
multiple host called groups, which holds multiple destination address. Any
is assigned to group of interface. It is delivered to only one
Broadcast is not defined in IPV6 interface, possibl
Features of IPV6

Large address space.


Simplified header
End - to - end connectivity
Auto configuration
Fast routing /Forwarding
IPSec
No Broadrast
NetworkLayer 345
Anycast support
Mobility
Enhanced Priority Support
Smooth transition
Extendibility
:
Address represen tation
Discards leading zeros.
Ey: 2004:0000: 3131: FED1:0033:0000:0000:EEFB

2004:0000:3 13 1:FEDI:33:0000:0000:EEFB
Consecutive zeros can be replaced by colon,
2004:0000:3131:FED1:33: :EEFB
In IPV6 changes have been made ín its size and
format in terms of
Base header

New options
Extensions
Resource allocation
Security
IPV6 datagram

Base
header Paylcad
Base beader

12 16 24 31
Version Tratfic
dass Fiow Label
Payioad Lengtn Next Hop
Header Limit
Source Address
Destination Address
router.
and
extension
header,
combination datagram.
requirements. the
by
more
a IPV6.not the
is source
provide
IPV6 by
with in visited
I'V6payload adopted
by
onlyto
of header router
number is fragmented (ESP)
different priority
I"'V4 extension to
Payload
version inlow. Extension
hender
information
Pad
|-Alignment
purpose
Extension
header
Distingulsh
dataTTL Header and
Payload are
Next
control Security
Defineslandles dat
as Actual
Paylond
Header
Next
Length Next
Header
Length of
datagrams
typcs (ii)
Source
routing (v)
Authentication
Same (iv)
Fragmentation sends
flow hop (ii)
Destination Encrypted
Class six
labellimit- of IPV6 by -
hop
Traffle
Verslon
IPVG
paylond Concept has hop
Ilowlop In IPV6 by
datagram.
(i) (vi) Hop
146
3.47
Network Layer
Pad N-Used extra bytes for alignment
Jumbo Payload - longer payload.
Destination Option - Source sends information to only destination not to the
intermediate routers.
route.
Source Routing - Follows strict source and loose source
Path MTUDiscovery
Fragmentation - Only source can fragment a packet. It use
technique to find smallest MTU.
integrity of data.
Authentication - It validates the authentication and
eaves dropping.
ESP- It provides confidentiality and avoids
3.8 SUBNET
Pe cnecifically.
5
5

10

4
63

TAT- I|
Pat-A

) Stake he functions o TCHP, pastocot.


The intot Cardaut mesAage pnsta Col tb a
netuoss Jayes patoCd ised by netuok desices to
diagenose Uhe Netuodk CeurReion Comsrunrafign sALpb
TCMPV, is mainly used to deterunüne uhether (an) nat
data ib eachuag ts itended destination n the timing
rON mEssnge.
TCMP always Used ioto aepot about ehon
to the oriqinal Sounce
a) lit the ditkonene betueen IPVL &&TPV% lon) ahy íp
tn poukosd
The intemet poutocot, vession b mgate oe
Vesion
advaned venaicn ad has beto foatues CoTnpaterd
tPV It has a Capaity to Pavide an infinüke ro
addess Tt S eplaing IPV, to aCCoMCdatethe
and
qrouinq rumben o8 netuoks tuold uide helps to
Soue Ip adcbess problem
a) Difeertiate c ihcuut Suitcherd Netwoxks A parkot
Suritched netwok's
Cicuit Surithing Packet Suitching

ohaseb. ti) Carechion estabishmad ci) Connection ostabishmert


) datatanalen g Carnecion
tonúnaton. Here each data i) Conertion teminatian
tunit kroWS the ente Path

) Dly betueen the Source e Delay between sdurue k


testination a riot urtoum
rot a stone Aome A Fouard
fous aud TochniquE tochnique
) TorsmisAin f data |tansmússí¡n c data Ús done
done by Goue aloe by Sse & Routeh

4) Tdentiky the Addess ciass the tolauirg


addyess
c) llo0 0001 " |000 00 l . o 00| 10ll
a)Q00 - 58- Q0.1b5
- m-cos
b)188. 1b1. a3.20 224-237

a) classC 6) class B c) class Cd) CÙs E

5) Deire Time do ive (-TTL)


Time to bive refeon b the amirurt of tire the
Packet Can ive n the netwok bogore aeacing
tinatign (aa).The packet b 5et to
fo ecist inside a
des
houno dis cayuded by Juuten. T! s an
uebwok beloe benq
9 bit binavu value and t s Sot by the Souus
The mn timumTTL value u a65
6) outine the noed for Suitehing
T Couuer t one deuie to anothen desice uwe nood
Suich tt ú not aluays Cornect device a n any Gng to
mesh
Like stan. tNee ete, 50 to CaTYLert d
kopatogs doite
devre
the deuite u the arothen netuota
aom one netuouk to
tue need an intetae Such a, intnjain derice.
Suittch. suithing Can be o a ttypes
ichcut Suittig
) packet Suithing
In a nlu the weghts ne given by jns Shate Packets
and Cmtaun inkoumaticn Suach S 1outes
nsts. Fünd the shoatest pah cm node F to l othes

A f4
debn B
C

3
-G1

D(i)= min(o (a).I(u) +


B) C(w)

D)(E

You might also like