Preview

Internet Control Message Protocol and Destination Host Unreachable

Satisfactory Essays
Open Document
Open Document
433 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Internet Control Message Protocol and Destination Host Unreachable
Protocol numbers are used to configure firewalls, routers, and proxy servers. In Internet Protocol version 4 (IPv4, Request for Comments [RFC] 791I), the protocol number can be found in the Protocol field of an IP header.ICMP Echos are used mostly for troubleshooting. When there are 2 hosts which have communication problems, a few simple ICMP Echo requests will show if the 2 hosts have their TCP/IP stacks configured correctly and if there are any problems with the routes packets are taking in order to get to the other side
ICMP Echo Information
Type Name Reference
---- ------------------------- --------- 0 Echo Reply [RFC792]

Codes 0 No Code

1 Unassigned [JBP]

2 Unassigned [JBP]

3 Destination Unreachable [RFC792]

Codes 0 Net Unreachable 1 Host Unreachable 2 Protocol Unreachable 3 Port Unreachable 4 Fragmentation Needed and Don't Fragment was Set 5 Source Route Failed 6 Destination Network Unknown 7 Destination Host Unknown 8 Source Host Isolated 9 Communication with Destination Network is Administratively Prohibited 10 Communication with Destination Host is Administratively Prohibited 11 Destination Network Unreachable for Type of Service 12 Destination Host Unreachable for Type of Service 13 Communication Administratively Prohibited [RFC1812] 14 Host Precedence Violation [RFC1812] 15 Precedence cutoff in effect [RFC1812]

4 Source Quench [RFC792] Codes 0 No Code

5 Redirect

You May Also Find These Documents Helpful

  • Satisfactory Essays

    TCP/IP was developed in the 1960s to enable university scientists to transmit data from computer to computer.…

    • 932 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1120 Lab 3

    • 115 Words
    • 1 Page

    2. You can see what kind the time the IP address the destination the protocol and the length of the packet.…

    • 115 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    What field in the IP header determines the transport layer protocol that handles the contents of the packet?…

    • 434 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The NETSTAT utility is a command available on most platforms that enables a user to list the sockets in use on a system. The information returned by the command is only for the local host, and there is no provision for monitoring remote hosts using this utility.…

    • 670 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    NT1210Unit3Lab3

    • 1288 Words
    • 4 Pages

    Exercise 3.3.3 The most common protocols used from this suite are IP, TCP, and UDP. Briefly describe the purpose and functions of each of these.…

    • 1288 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    In a computer network internet protocol is used for communication, to each device such as printers and computers a numerical label called an IP (Internet Protocol) Address is assigned. There are two functions of an IP Address a host or network interface identification, and also provides a location addressing. The basic elements of a network are the IP Address and Subnet Mask. There is also switching and routing which after you connect devices to switches and routers, data packets can be moved across the network. The Internet Protocol Version 4 (known as IPv4) is a protocol highly used even today, this IP Address consist of a 32-bit number in decimal or binary in four parts. In 1995 Internet Protocol Version 6 (known as IPv6) was created due to a high growth of the Internet, and the reduction of…

    • 413 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 Lab 3.1 Review

    • 505 Words
    • 3 Pages

    What is the history of the TCP/IP model? Why was it created? Use your textbook and Internet research to support your answer.…

    • 505 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This column shows the protocol that the packet is using. It would be useful when trying to decide if the proper protocol is being used and if it is causing a conflict which could shut the system or program down.…

    • 1389 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    TCP / IP Model - provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. This functionality has been organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved.[1][2] From lowest to highest, the layers are the link layer, containing communication technologies for a single network segment (link), the internet layer, connecting hosts across independent networks, thus establishing internetworking.…

    • 559 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    TCP/IP is a suite of standards that computers use to communicate with across a medium4. TCP (transmission control protocol) is a protocol that requires a connection to transfer data from one node to another. UDP (user datagram protocol) does not require a connection. Information is split up into small sections called packets and sent over the medium. UDP does not require as much packet overhead as TCP and is more efficient to send data quickly. TCP is better for error checking of the data sent and received. Any protocol used has its…

    • 897 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    AIS Review Sheet

    • 2832 Words
    • 12 Pages

    6) TCP/IP: The Transmission Control Protocol specifies the procedures for dividing files and documents into packets to be sent over the Internet and the methods for reassembly of the original document or file at the destination. The Internet Protocol specifies the structure of those packets and how to route them to the proper destination.…

    • 2832 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Hacking2E Lab07 AW

    • 330 Words
    • 2 Pages

    3. How many different source IP host address did you capture in your protocol capture?…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computers use network protocols to communicate with computer network there are many network protocols as Hallberg (2005, p92) said “for example, transmission control protocols/internet protocols (TCP/IP) defines a set of rules used to send data from one node on a network to another node”.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 9 L3 BTEC IT P2

    • 339 Words
    • 2 Pages

    A protocol is the rules that computers follow when communicating therefore the standards of the network. For the communication to be successful two devices need to communicate the same way –with the same language or code- for the communication to be successful. If both devices are not following the same protocol then the communication won’t be successful due to the fact that both devices won’t understand each other. It is a bit like language barriers between people talking – if you don’t understand the language the person communicating to you is talking in you won’t understand what they are trying to communicate it is the same with computers.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    F 4. The protocols that Windows uses by default at the network and transport layers are collectively called TCP/IP.…

    • 482 Words
    • 2 Pages
    Satisfactory Essays