SlideShare une entreprise Scribd logo
1  sur  10
Icmp protocol
Ruhollah arabi student usc.ac.ir 2019
What icmp protocol
• Internet Control Message Protocol (ICMP) is a supporting protocol in
the Internet protocol suite
• It is used by network devices
• including routers
• the send error messages and operational information indicating
• ICMP differs from transport protocolssuch as TCP and UDP in that it is not
typically used to exchange data between systems
Technical details
• ICMP is part of the Internet protocol suite as defined in RFC 792
• ICMP messages are typically used for diagnostic or control purposes or generated
in response to errors in IP
Datagram structure
• Type :ICMP type, see Control messages.
• Code : ICMP subtype, see Control messages
• Checksum :Error checking data, calculated from
the ICMP header and data, with value 0
substituted for this field. The Internet Checksum
is used, specified in RFC 1071
• Variable
Application icmp
Ping
• Ping is a basic Internet program that allows a user to verify that a particular IP
address exists and can accept requests.
• Ping is used diagnostically to ensure that a host computer the user is trying to reach
is actually operating. Ping works by sending an Internet Control Message Protocol
(ICMP) Echo Request to a specified interface on the network and waiting for a
reply. Ping can be used for troubleshooting to test connectivity and determine
response time.
• Check ip or domain
• Ping 192.168.1.1
• Ping www.google.com
traceroute
• For most of us, phone calls and Internet
connections seem to happen
instantaneously. It feels as if our computer
has a direct line to our favorite websites.
Web pages load so fast that it seems that
we must have a direct connection to any
computer, even one across the country.But
we don't.
traceroute
• The traceroute identifies each computer/server on that list and the amount of
time it took the data to get from one computer to the next. If there was a hiccup
or interruption in the transfer of data, the traceroute will show where along the
chain the problem occurred.
Traceroute How data travels.
• Each computer on the traceroute is identified by its IP address, which is the nine-
digit number separated by periods that identifies that computer's unique
network connection.
•
n the past, computer hackers would routinely use traceroutes to map how
information moved within a company's computer network and then focus their
attacks on certain computers. To combat that security threat, some networks will
not allow you to perform a traceroute.
Traceroute How to run a traceroute
• Windows command line tracert tracert www.google.com
• Unix Traceroute Traceroute www.google.com

Contenu connexe

Tendances

Address resolution protocol
Address resolution protocolAddress resolution protocol
Address resolution protocol
asimnawaz54
 

Tendances (20)

Address resolution protocol
Address resolution protocolAddress resolution protocol
Address resolution protocol
 
Icmp
IcmpIcmp
Icmp
 
Presentation on arp protocol
Presentation on arp protocolPresentation on arp protocol
Presentation on arp protocol
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing Protocols
 
TCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet ProtocolTCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet Protocol
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
Rarp
RarpRarp
Rarp
 
Distance Vector Routing
Distance Vector RoutingDistance Vector Routing
Distance Vector Routing
 
ICMPV4
ICMPV4ICMPV4
ICMPV4
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol
 
Ch 18 intro to network layer - section 1
Ch 18   intro to network layer - section 1Ch 18   intro to network layer - section 1
Ch 18 intro to network layer - section 1
 
Icmp
IcmpIcmp
Icmp
 
icmp , igmp
icmp , igmpicmp , igmp
icmp , igmp
 
DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol)DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol)
 
Chapter 21
Chapter 21Chapter 21
Chapter 21
 
Connection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion ControlConnection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion Control
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
 
DHCP
DHCPDHCP
DHCP
 

Similaire à ICMP

Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
GLIM Digital
 
How the internet works
How the internet worksHow the internet works
How the internet works
ftcim
 
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjchapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhj
AmitDeshai
 
Nachos Theoretical assigment 3
Nachos Theoretical assigment 3Nachos Theoretical assigment 3
Nachos Theoretical assigment 3
colli03
 
gkk20211e4djwew4dSecurity essentials domain 2
gkk20211e4djwew4dSecurity essentials   domain 2gkk20211e4djwew4dSecurity essentials   domain 2
gkk20211e4djwew4dSecurity essentials domain 2
Anne Starr
 
gkk_2021123rg5hSecurity essentials domain 2
gkk_2021123rg5hSecurity essentials   domain 2gkk_2021123rg5hSecurity essentials   domain 2
gkk_2021123rg5hSecurity essentials domain 2
Anne Starr
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2
Anne Starr
 

Similaire à ICMP (20)

Unit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptxUnit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptx
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
 
How the internet works
How the internet worksHow the internet works
How the internet works
 
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjchapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhj
 
icmp protocol.pptx
icmp protocol.pptxicmp protocol.pptx
icmp protocol.pptx
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
 
ppt on servicenow.pptx
ppt on servicenow.pptxppt on servicenow.pptx
ppt on servicenow.pptx
 
Ping-and-Traceroute.ppt
Ping-and-Traceroute.pptPing-and-Traceroute.ppt
Ping-and-Traceroute.ppt
 
Network security
Network securityNetwork security
Network security
 
Nachos Theoretical assigment 3
Nachos Theoretical assigment 3Nachos Theoretical assigment 3
Nachos Theoretical assigment 3
 
gkk20211e4djwew4dSecurity essentials domain 2
gkk20211e4djwew4dSecurity essentials   domain 2gkk20211e4djwew4dSecurity essentials   domain 2
gkk20211e4djwew4dSecurity essentials domain 2
 
gkk_2021123rg5hSecurity essentials domain 2
gkk_2021123rg5hSecurity essentials   domain 2gkk_2021123rg5hSecurity essentials   domain 2
gkk_2021123rg5hSecurity essentials domain 2
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2
 
MVA slides lesson 8
MVA slides lesson 8MVA slides lesson 8
MVA slides lesson 8
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8
 
Internet census 2012
Internet census 2012Internet census 2012
Internet census 2012
 
NME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdfNME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdf
 
Electronic Commerce - Infrastructure for Ecommerce
Electronic Commerce - Infrastructure for Ecommerce Electronic Commerce - Infrastructure for Ecommerce
Electronic Commerce - Infrastructure for Ecommerce
 
Protolcols in communication system
Protolcols in communication systemProtolcols in communication system
Protolcols in communication system
 

Dernier

Dernier (11)

Deciding The Topic of our Magazine.pptx.
Deciding The Topic of our Magazine.pptx.Deciding The Topic of our Magazine.pptx.
Deciding The Topic of our Magazine.pptx.
 
2024-05-15-Surat Meetup-Hyperautomation.pptx
2024-05-15-Surat Meetup-Hyperautomation.pptx2024-05-15-Surat Meetup-Hyperautomation.pptx
2024-05-15-Surat Meetup-Hyperautomation.pptx
 
Understanding Poverty: A Community Questionnaire
Understanding Poverty: A Community QuestionnaireUnderstanding Poverty: A Community Questionnaire
Understanding Poverty: A Community Questionnaire
 
SaaStr Workshop Wednesday with CEO of Guru
SaaStr Workshop Wednesday with CEO of GuruSaaStr Workshop Wednesday with CEO of Guru
SaaStr Workshop Wednesday with CEO of Guru
 
Databricks Machine Learning Associate Exam Dumps 2024.pdf
Databricks Machine Learning Associate Exam Dumps 2024.pdfDatabricks Machine Learning Associate Exam Dumps 2024.pdf
Databricks Machine Learning Associate Exam Dumps 2024.pdf
 
TSM unit 5 Toxicokinetics seminar by Ansari Aashif Raza.pptx
TSM unit 5 Toxicokinetics seminar by  Ansari Aashif Raza.pptxTSM unit 5 Toxicokinetics seminar by  Ansari Aashif Raza.pptx
TSM unit 5 Toxicokinetics seminar by Ansari Aashif Raza.pptx
 
DAY 0 8 A Revelation 05-19-2024 PPT.pptx
DAY 0 8 A Revelation 05-19-2024 PPT.pptxDAY 0 8 A Revelation 05-19-2024 PPT.pptx
DAY 0 8 A Revelation 05-19-2024 PPT.pptx
 
Microsoft Fabric Analytics Engineer (DP-600) Exam Dumps 2024.pdf
Microsoft Fabric Analytics Engineer (DP-600) Exam Dumps 2024.pdfMicrosoft Fabric Analytics Engineer (DP-600) Exam Dumps 2024.pdf
Microsoft Fabric Analytics Engineer (DP-600) Exam Dumps 2024.pdf
 
ServiceNow CIS-Discovery Exam Dumps 2024
ServiceNow CIS-Discovery Exam Dumps 2024ServiceNow CIS-Discovery Exam Dumps 2024
ServiceNow CIS-Discovery Exam Dumps 2024
 
The Influence and Evolution of Mogul Press in Contemporary Public Relations.docx
The Influence and Evolution of Mogul Press in Contemporary Public Relations.docxThe Influence and Evolution of Mogul Press in Contemporary Public Relations.docx
The Influence and Evolution of Mogul Press in Contemporary Public Relations.docx
 
ACM CHT Best Inspection Practices Kinben Innovation MIC Slideshare.pdf
ACM CHT Best Inspection Practices Kinben Innovation MIC Slideshare.pdfACM CHT Best Inspection Practices Kinben Innovation MIC Slideshare.pdf
ACM CHT Best Inspection Practices Kinben Innovation MIC Slideshare.pdf
 

ICMP

  • 1. Icmp protocol Ruhollah arabi student usc.ac.ir 2019
  • 2. What icmp protocol • Internet Control Message Protocol (ICMP) is a supporting protocol in the Internet protocol suite • It is used by network devices • including routers • the send error messages and operational information indicating • ICMP differs from transport protocolssuch as TCP and UDP in that it is not typically used to exchange data between systems
  • 3. Technical details • ICMP is part of the Internet protocol suite as defined in RFC 792 • ICMP messages are typically used for diagnostic or control purposes or generated in response to errors in IP
  • 4. Datagram structure • Type :ICMP type, see Control messages. • Code : ICMP subtype, see Control messages • Checksum :Error checking data, calculated from the ICMP header and data, with value 0 substituted for this field. The Internet Checksum is used, specified in RFC 1071 • Variable
  • 6. Ping • Ping is a basic Internet program that allows a user to verify that a particular IP address exists and can accept requests. • Ping is used diagnostically to ensure that a host computer the user is trying to reach is actually operating. Ping works by sending an Internet Control Message Protocol (ICMP) Echo Request to a specified interface on the network and waiting for a reply. Ping can be used for troubleshooting to test connectivity and determine response time. • Check ip or domain • Ping 192.168.1.1 • Ping www.google.com
  • 7. traceroute • For most of us, phone calls and Internet connections seem to happen instantaneously. It feels as if our computer has a direct line to our favorite websites. Web pages load so fast that it seems that we must have a direct connection to any computer, even one across the country.But we don't.
  • 8. traceroute • The traceroute identifies each computer/server on that list and the amount of time it took the data to get from one computer to the next. If there was a hiccup or interruption in the transfer of data, the traceroute will show where along the chain the problem occurred.
  • 9. Traceroute How data travels. • Each computer on the traceroute is identified by its IP address, which is the nine- digit number separated by periods that identifies that computer's unique network connection. • n the past, computer hackers would routinely use traceroutes to map how information moved within a company's computer network and then focus their attacks on certain computers. To combat that security threat, some networks will not allow you to perform a traceroute.
  • 10. Traceroute How to run a traceroute • Windows command line tracert tracert www.google.com • Unix Traceroute Traceroute www.google.com