Lectures notes for 2010 - KTH
Lectures notes for 2010 - KTH Lectures notes for 2010 - KTH
ICMP Summary • Destination (Network/Host/Protocol/Port/...) Unreachable • Time Exceeded - i.e., TTL expired • Used to implement traceroute • Parameter problem - IP header error • Source Quench- asks source to decrease its sending rate • Redirect - tells the source to send packets to a “better” address • Echo Request/Echo reply - for testing • ping: sends an Echo Request, then measures the time until the matching reply is received • Timestamp Request/Reply • Round Trip Time (RTT) computation • Clock synchronization • Address Mask Request/Reply • Allows diskless systems to learn their subnet mask • Router Solicitation and Advertisment • Hosts query routers • Routers advertise presence and routes The above is a partial summary of ICMP’s uses. Maguire ICMP Summary 3: 31 of 33 maguire@kth.se 2010.03.21 Internetworking/Internetteknik
This lecture we have discussed: • IP • ICMP • tools: Ping, Traceroute Summary Maguire Summary 3: 32 of 33 maguire@kth.se 2010.03.21 Internetworking/Internetteknik
- Page 179 and 180: RARP server Someone has to know the
- Page 181 and 182: Novel IPX/SPX Addresses Another app
- Page 183 and 184: tcpdump Under HP-UX 11.0 # ./tcpdum
- Page 185 and 186: Tools Used: tcpdump Program tcpdump
- Page 187 and 188: Maguire Wireshark (formerly Etherea
- Page 189 and 190: Tools Used: sock Program • A simp
- Page 191 and 192: #include #include #include #incl
- Page 193 and 194: Wireshark’s IO Graph functionalit
- Page 195 and 196: Interarrival delay and variance Fig
- Page 197 and 198: Summary This lecture we have discus
- Page 199 and 200: [10] Gianluca Insolvibile, “The L
- Page 201 and 202: • IP • ICMP • Useful Diagnost
- Page 203 and 204: checksum, and options fields. Magui
- Page 205 and 206: MTU½≡Maximum Transmission Unit M
- Page 207 and 208: Fields relevant to Fragmentation
- Page 209 and 210: Serial line throughput At 9,000 bit
- Page 211 and 212: 7 {ECN Capable Transport (ECT) and
- Page 213 and 214: Precedence Precedence values are de
- Page 215 and 216: Precendence and telephony systems S
- Page 217 and 218: TTL field Time To Live (TTL) (8 bit
- Page 219 and 220: IPv4 Options • IPv4 options were
- Page 221 and 222: Categories of IP Options • Single
- Page 223 and 224: ICMP Port Unreachable Error Example
- Page 225 and 226: PING: Packet InterNet Groper or son
- Page 227 and 228: On a HP-UX 11.0 machine: ping -ov w
- Page 229: Useful Tool: Traceroute Programs De
- Page 233 and 234: IK1550 Internetworking/Internettekn
- Page 235 and 236: Transport layer protocols The trans
- Page 237 and 238: User Datagram Protocol (UDP) • Da
- Page 239 and 240: UDP Checksum and Pseudo-Header •
- Page 241 and 242: Port numbers in three groups Range
- Page 243 and 244: Fragmentation Required If datagram
- Page 245 and 246: • on a BSDI system: • each of t
- Page 247 and 248: With an even larger UDP packet I re
- Page 249 and 250: Datagram truncation What if the app
- Page 251 and 252: Learning about Socket programming F
- Page 253 and 254: UDP server design Stevens, Vol, 1,
- Page 255 and 256: Changed the client Changing the fol
- Page 257 and 258: if (!(proto = getprotobyname("raw")
- Page 259 and 260: ICMP Source Quench Error Since UDP
- Page 261 and 262: No error control Since UDP has no e
- Page 263 and 264: BOOTP continued When a request is s
- Page 265 and 266: DHCP: Dynamic Host Configuration Pr
- Page 267 and 268: • Message - used by a server to p
- Page 269 and 270: DHCP’s importance • allows reus
- Page 271 and 272: Example of dhcpd.conf ### Managed b
- Page 273 and 274: Trivial File Transfer Procotol (TFT
- Page 275 and 276: Mapping names to IP addresses Host
- Page 277 and 278: Zones A zone is a subtree of the DN
- Page 279 and 280: (see Stevens, Vol. 1, figure 14.2,
This lecture we have discussed:<br />
• IP<br />
• ICMP<br />
• tools: Ping, Traceroute<br />
Summary<br />
Maguire Summary 3: 32 of 33<br />
maguire@kth.se <strong>2010</strong>.03.21 Internetworking/Internetteknik