1 / 29

CCNA 2 v3.1 Module 8 TCP/IP Suite Error and Control Messages

Learn about the Internet Control Message Protocol (ICMP) and how it handles error reporting and control messages in the TCP/IP protocol suite.

ndennis
Download Presentation

CCNA 2 v3.1 Module 8 TCP/IP Suite Error and Control Messages

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CCNA 2 v3.1 Module 8 TCP/IP Suite Error and Control Messages

  2. Objectives

  3. Internet Control Message Protocol (ICMP)

  4. ICMP • The Internet Control Message Protocol (ICMP) is an integral part of the TCP/IP protocol suite. • The reasons for ICMP • IP does not guarantee delivery, it has no inherent method to inform hosts when errors occur • IP has no built-in method to provide informational or control messages to hosts • ICMP performs these functions for IP

  5. 1. Error Reporting • ICMP is an error-reporting protocol for IP.

  6. ICMP Error Reporting • When datagram delivery errors occur, ICMP is used to report these errors back to the source of the datagram • ICMP does not correct the encountered network problem; it merely reports the problem • ICMP reports on the status of the delivered packet only to the source device • It does not propagate information about network changes to routers

  7. ICMP Message Delivery • ICMP messages are encapsulated as data in datagrams in the same way any other data is delivered using IP. • Since ICMP messages are transmitted in the same way as any other data, they are subject to the same delivery failures • This creates a scenario where error reports could generate more error reports, causing increased congestion on an already ailing network. For this reason, errors created by ICMP messages do not generate their own ICMP messages • It is possible to have a datagram delivery error that is never reported back to the sender of the data

  8. Unreachable Networks

  9. Ping

  10. Echo Request • The ICMP protocol can be used to test the availability of a particular destination. • ICMP can be used to issue an echo request message to the destination device • If the destination device receives the ICMP echo request, it formulates an echo reply message to send back to the source of the echo request • If the sender receives the echo reply, this confirms that the destination device can be reached via the IP protocol • The echo request message is initiated using the ping command

  11. Detecting Excessively Long Routes • Whether the actual path includes too many hops or a circular routing path exists, the packet will eventually reach the end of its life, known as its time-to-live (TTL).

  12. Time-To-Live (TTL) • RIP has a limit on the distance a certain routing information is allowed to travel. • The hop limit of RIP is 15, which means that the packet will only be allowed to pass through 15 routers • This is also known as reaching its time-to-live (TTL), because the TTL value typically matches the maximum hop count defined by the routing protocol • A TTL value is defined in each datagram. As each router processes the datagram, it decreases the TTL value by one • When the TTL of the datagram value reaches zero, the packet is discarded. ICMP uses a time exceeded message to notify the source device that the TTL of the datagram has been exceeded

  13. ICMP Packet Format • All ICMP message formats start with these same three fields: • Type • The type field indicates the type of ICMP message being sent • Code • The code field includes further information specific to the message type • Checksum • The checksum field, as in other types of packets, is used to verify the integrity of the data • The identifier and sequence fields • Are used to match the echo replies to the corresponding echo request • The data field • Additional information that may be a part of the echo reply or echo request message

  14. ICMP Packet Format

  15. ICMP Message Types • For example ping sends a type 8 message and the destination replies with a type 0 message.

  16. Destination Unreachable Message • If a packet is undeliverable because there is no known route to the destination the router sends an ICMP host unreachable message to the source

  17. Code Values for Destination Unreachable Messages • When a destination unreachable message is generated a code value is returned to provide a reason why a packet was not delivered

  18. 2. ICMP Control Messages

  19. ICMP Control Messages • Unlike error messages, control messages are not the results of lost packets or error conditions which occur during packet transmission. • They are used to inform hosts of conditions such as network congestion or the existence of a better gateway to a remote network • Like all ICMP messages, ICMP control messages are encapsulated within an IP datagram • ICMP uses IP datagrams in order to traverse multiple networks

  20. ICMP Redirect/Change Requests • This type of message can only be initiated by a gateway (router) • All hosts that communicate with multiple IP networks must be configured with a default gateway • This default gateway is the address of a router port connected to thesame network as the host • Normally, the hosts are connected to a single gateway • In some circumstances, a host connects to a segment that has two or more directly connected routers • In this case, the default gateway of the host may need to use a redirect/change request to inform the host of the best path to a certain network

  21. ICMP redirect/change request messages • Default gateways only send ICMP redirect/change request messages if the following conditions are met: • The interface on which the packet comes into the router is the same interface on which the packet gets routed out. • The subnet/network of the source IP address is the same subnet/network of the next-hop IP address of the routed packet. • The datagram is not source-routed. • The route for the redirect is not another ICMP redirect or a default route. • The router is configured to send redirects (default) • The Router Internet Address field in the ICMP redirect is the IP address that should be used as the default gateway for a particular network

  22. Clock Synchronization and TransitTime Estimation • The ICMP timestamp request message allows a host to ask for the current time according to the remote host. • The remote host uses an ICMP timestamp reply message to respond to the request. • The ICMP timestamp request contains an originate timestamp, which is the time on the requesting host just before the timestamp request is sent • The receive timestamp is the time that the destination host receives the ICMP timestamp request • The transmit timestamp is filled in just before the ICMP timestamp reply is returned

  23. Address Mask Requirements • When a network administrator uses the process of subnetting to divide a major IP address into multiple subnets, a new subnet mask is created. • This new subnet mask is crucial in identifying network, subnet, and host bits in an IP address • If a host does not know the subnet mask, it may send an address mask request to the local router • If the address of the router is known, this request may be sent directly to the router. Otherwise, the request will be broadcast • When the router receives the request, it will respond with an address mask reply. This address mask reply will identify the correct subnet mask • ICMP type number of 17 is assigned to the request and 18 is assigned to the reply

  24. Router Discovery Message • When a host on the network boots, and the host has not been manually configured with a default gateway, it can learn of available routers through the process of router discovery. • This process begins with the host sending a router solicitation message to all routers, using the multicast address 224.0.0.2 as the destination address • The router discovery message may also be broadcast to include routers that may not be configured for multicasting • If a router discovery message is sent to a router that does not support the discovery process, the solicitation will go unanswered. • When a router that supports the discovery process receives the router discovery message, a router advertisement is sent in return identifying the default gateway for the local host

  25. Congestion and Flow Control Messages ICMP source-quench messages are used to reduce the amount of data lost from congestion.

  26. Congestion and Flow Control Messages • If multiple computers try to access the same destination at the same time, the destination computer can be overwhelmed with traffic • Congestion can also occur when traffic from a high speed LAN reaches a slower WAN connection • Dropped packets occur when there is too much congestion on a network

  27. Congestion and Flow Control Messages • ICMP source-quench messages are used to reduce the amount of data lost from congestion. • The source-quench message asks senders to reduce the rate at which they are transmitting packets • In most cases, congestion will subside after a short period of time, and the source will slowly increase the transmission rate as long as no other source-quench messages are received • Most Cisco routers do not send source-quench messages by default, because the source-quench message may itself add to the network congestion

  28. Congestion and Flow Control • A small office home office (SOHO) is a scenario where ICMP source-quench messages might be used effectively • One such SOHO could consist of four computers networked together using CAT-5 cable and Internet connection sharing (ICS) over a 56K modem • It is easy to see that the 10Mbps bandwidth of the SOHO LAN could quickly overwhelm the available 56K bandwidth of the WAN link, resulting in data loss and retransmissions • With ICMP messaging, the host acting as the gateway in the ICS can request that the other hosts reduce their transmission rates to a manageable level, thus preventing continued data loss

  29. Summary

More Related