SlideShare a Scribd company logo
UNIT-III
FORWARDING IP DATAGRAMS AND ICMP
Internet Protocol:
Forwarding IP Datagrams
Forwarding in an internet
• Routing was used with packet switching systems
• Forwarding refer to the process of choosing the path for a packet.
• Router performs forwarding.
• switched Ethernet-the switches are responsible for forwarding
Ethernet frames among computers.
• The major differences are that in place of frames the Internet accepts
and delivers IP datagrams, and in place of Ethernet addresses, the
Internet uses IP addresses. Therefore, throughout the chapter, we will
restrict the discussion to IP forwarding.
• The information IP software uses to make forwarding decisions is
known as a Forwarding Information Base(FIB).
• Each router has direct connections to two or more networks.
• Both hosts and routers participate in forwarding an IP datagram to its
destination.
• In the figure, two routers connect to the same network as the host.
Some internet destinations lie beyond router R1 and other
destinations lie beyond R2. The host must decide which router to use
for a given datagram.
• A router performs transit forwarding, which means the router will
accept incoming datagrams from any of the networks to which the
router attaches, and will forward each datagram on toward its
destination.
Direct and Indirect delivery
• forwarding into two forms:
• direct delivery
• indirect delivery.
• Direct delivery-the transmission of a datagram from one machine
across a single physical network directly to another(both connected
directly).
• Indirect delivery occurs when the destination of a datagram is not on
a directly attached network.
Transmission across a single network
• Transmission of an IP datagram between two machines on a single
physical network does not involve routers.
• The sender encapsulates the datagram in a physical frame, binds the
next-hop address to a physical hardware address, and sends the
resulting frame directly to the destination.
• To determine if a destination lies on one of the directly connected
networks, IP software extracts the network portion of the destination
IP address and compares the network ID to the network ID of its own
IP address(es).
Indirect delivery
• Indirect delivery is more difficult than direct delivery because the
sending machine must identify an initial router to handle the
datagram.
• The router must then forward the datagram on toward the
destination network.
• Routers in a TCP/IP internet form a cooperative, interconnected
structure. Datagrams pass from router to router until they reach a
router that can deliver the datagram directly.
• Finally,
• A host only knows about directly-connected networks; a host relies on routers
to transfer datagrams to remote destinations.
• Each router knows how to reach all possible destinations in the internet;
given a datagram, a router can forward it correctly.
Table driven IP forwarding
• IP performs datagram forwarding. The IP forwarding algorithm
employs a data structure that stores information about possible
destinations and how to reach them.
• The data structure is known formally as an Internet Protocol
forwarding table or IP forwarding table, and informally as simply a
forwarding table.
• Both hosts and routers have a forwarding table.
• If every forwarding table contained information about every possible
destination in an internet, it would be impossible to keep the tables
current.
• Because it allows forwarding to be based on network prefixes, the IP
addressing scheme controls the size of forwarding tables.
Next-Hop forwarding
• A forwarding table contains a set of pairs (N, R), where N is the
network prefix for a network in the internet and R is the IP address of
the “next” router along the path to network N.
• Router R is called the next hop, and the idea of using a forwarding
table to store a next hop for each destination is called next-hop
forwarding.
• the network portion of a destination IP address instead of the
complete address keeps forwarding tables small. It helps hide
information, keeping the details of specific hosts.
NP - Unit 3 - Forwarding Datagram and ICMP
Default Routes And A Host Example
• If no entry in the table matches the destination address, the
forwarding software takes a second step of checking for a default
route.
• We say that the next hop specified in a default route is a default
router.
• A default route can be incorporated into a forwarding table.
• A default route is especially useful when many destinations lie
beyond a single router.
• Default routing works especially well for typical host computers that
obtain service from an ISP.
NP - Unit 3 - Forwarding Datagram and ICMP
Host-Specific Routes
• Most IP forwarding software allows a host-specific route to be
specified as a special case.
• Having host-specific routes gives a network administrator more
control.
• The ability to specify a route for individual machines turns out to have
several possible uses:
• Control over network use
• Testing a new network.
• Security
The IP Forwarding Algorithm
Longest-Prefix Match Paradigm
• longest-prefix match - to describe the idea of examining the most
specific routes first.
NP - Unit 3 - Forwarding Datagram and ICMP
Forwarding Tables And IP Addresses
• It is important to understand that except
for decrementing the hop limit (TTL in
IPv4) and recomputing the checksum,
IP forwarding does not alter the
original datagram.
• In the algorithm, the IP address selected by the IP forwarding
algorithm is called a next-hop address because it tells where the
datagram must be sent next.
Handling Incoming Datagrams
• host software
• router software
• four reasons why a host should refrain from performing any
forwarding.
• Forwarding In The Presence Of Broadcast And Multicast
• Software Routers And Sequential Lookup
• Establishing Forwarding Tables
Internet Protocol: Error And
Control Messages (ICMP)
Introduction
• Connectionless system.
• When a datagram arrives, a router forwards or delivers the datagram
and then goes on to the next datagram; the router does not
coordinate with the original sender of a datagram.
• Failures of network and processor hardware, IP cannot deliver a
datagram if the destination machine is temporarily or permanently
disconnected from the network, if the hop limit expires before a
datagram reaches its destination, or if an intermediate router
becomes so overloaded that it must discard a datagram.
ICMP - Internet Control Message Protocol
• allows routers to send error or control messages back to the source of a
datagram that caused a problem.
• ICMP is primarily intended to inform a source when a datagram sent by the
source experiences problems.
• ICMP messages are not usually delivered to applications.
• ICMP messages are sent to Internet Protocol software on the source
computer. That is, when an ICMP error message arrives on a computer, the
ICMP software module on the computer handles the message.
• The chief advantage of allowing hosts to use ICMP is that it provides a
single mechanism used for all control and information messages.
Error Reporting Vs. Error Correction
• ICMP is an error reporting mechanism
• It provides a way for routers that encounter an error to report the
error to the original source, but ICMP does not interact with the host
nor does ICMP attempt to correct the error.
• When a datagram causes an error, ICMP can only report the error
condition back to the original source of the datagram; the source
must relate the error to an individual application program or take
other action to correct the problem.
ICMP Message Delivery
• Because each ICMP message travels in an IP datagram, two levels of
encapsulation are required.
• IPv4 uses the PROTOCOL field in the datagram header as a type field.
• When an ICMP message is carried in the payload area of an IPv4 datagram,
the PROTOCOL field is set to 1.
• IPv6 uses the NEXT HEADER field to specify the type of the item being
carried.
• When an ICMP message is carried in the payload area of an IPv6 datagram,
the NEXT HEADER field of the header that is previous to the ICMP message
contains 58.
ICMP Message Format
• Conceptual Layering
• TYPE
• CODE
• CHECKSUM
Example ICMP Message Types Used With IPv4
Example ICMPv6 message types and the
meaning of each.
Testing Destination Reachability And Status
(Ping)
• Ping sends an ICMP Echo Request message to a remote computer.
• Any computer that receives an ICMP Echo Request creates an ICMP
Echo Reply and returns the reply to the original sender.
Echo Request And Reply Message Format:
• IPv4 : TYPE 8 – request, 0-reply
• IPv6: TYPE request -128 reply-129
Checksum Computation And The IPv6
Pseudo-Header
Reports Of Unreachable Destinations
• Whenever an error prevents a router from forwarding or delivering a
datagram, the router sends an ICMP destination unreachable
message back to the source and then drops(i.e., discards) the
datagram.
• Both IPv4 and IPv6 use the same format for destination unreachable
messages.
The CODE values for an ICMP destination
unreachable message
ICMP Error Reports Regarding Fragmentation
Route Change Requests From Routers
• Routers are assumed to know correct routes; hosts begin with
minimal routing information and learn new routes from routers
Detecting Circular Or Excessively Long Routes
• ICMP time exceeded message
Reporting Other Problems
• parameter problem message
Older ICMP Messages Used At Startup
• ICMPv6 Router Discovery message
Ad

More Related Content

What's hot (20)

MVA slides lesson 4
MVA slides lesson 4MVA slides lesson 4
MVA slides lesson 4
Fabio Almeida- Oficina Eletrônica
 
Network protocol
Network protocolNetwork protocol
Network protocol
Online
 
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
Danial Mirza
 
98 366 mva slides lesson 7
98 366 mva slides lesson 798 366 mva slides lesson 7
98 366 mva slides lesson 7
suddenven
 
Chapter07
Chapter07Chapter07
Chapter07
Muhammad Ahad
 
MVA slides lesson 6
MVA slides lesson 6MVA slides lesson 6
MVA slides lesson 6
Fabio Almeida- Oficina Eletrônica
 
MVA slides lesson 1
MVA slides lesson 1MVA slides lesson 1
MVA slides lesson 1
Fabio Almeida- Oficina Eletrônica
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
Harshit Srivastava
 
TCP/IP(networking)
TCP/IP(networking)TCP/IP(networking)
TCP/IP(networking)
welcometofacebook
 
02 protocols and tcp-ip
02 protocols and tcp-ip02 protocols and tcp-ip
02 protocols and tcp-ip
myl_1116
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
AnyapuPranav
 
Chapter05
Chapter05Chapter05
Chapter05
Muhammad Ahad
 
Firewall
FirewallFirewall
Firewall
Muuluu
 
IP Routing
IP RoutingIP Routing
IP Routing
Peter R. Egli
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
AnaniaKapala
 
02 coms 525 tcpip - introduction to tcpip
02   coms 525 tcpip -  introduction to tcpip02   coms 525 tcpip -  introduction to tcpip
02 coms 525 tcpip - introduction to tcpip
Palanivel Kuppusamy
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8
suddenven
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
sanjoysanyal
 
TCPIP
TCPIPTCPIP
TCPIP
Flavio Girella
 
Tcp ip-ppt
Tcp ip-pptTcp ip-ppt
Tcp ip-ppt
suganyababu14
 

Similar to NP - Unit 3 - Forwarding Datagram and ICMP (20)

Transport Layer, Network layer.pptx
Transport Layer, Network layer.pptxTransport Layer, Network layer.pptx
Transport Layer, Network layer.pptx
MuhammadMoosaPanhwar
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
Ramakrishna Kongalla
 
icmp_error_reporting_icmp_protocols.pptx
icmp_error_reporting_icmp_protocols.pptxicmp_error_reporting_icmp_protocols.pptx
icmp_error_reporting_icmp_protocols.pptx
Chaudharyshani2
 
TCPIP SLIDES.ppt
TCPIP SLIDES.pptTCPIP SLIDES.ppt
TCPIP SLIDES.ppt
aymenshykh
 
Computer network coe351- part3-final
Computer network coe351- part3-finalComputer network coe351- part3-final
Computer network coe351- part3-final
Taymoor Nazmy
 
Nnnnnn
NnnnnnNnnnnn
Nnnnnn
nautami
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layer
Zee Haak
 
TCP/IP and UDP protocols
TCP/IP and UDP protocolsTCP/IP and UDP protocols
TCP/IP and UDP protocols
Dawood Faheem Abbasi
 
ICMP.ppt
ICMP.pptICMP.ppt
ICMP.ppt
AnilKumarD22
 
data communication protocol
data communication protocoldata communication protocol
data communication protocol
Ramla Sheikh
 
474-22-DatagramForwarding.pptx
474-22-DatagramForwarding.pptx474-22-DatagramForwarding.pptx
474-22-DatagramForwarding.pptx
ThangamaniR3
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
N.Jagadish Kumar
 
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdf
BIT DURG
 
Chapter 4 internetworking [compatibility mode]
Chapter 4   internetworking [compatibility mode]Chapter 4   internetworking [compatibility mode]
Chapter 4 internetworking [compatibility mode]
Sĩ Anh Nguyễn
 
IP HEADER_CLASSFUL Addressing and Classless addressing
IP HEADER_CLASSFUL Addressing and Classless addressingIP HEADER_CLASSFUL Addressing and Classless addressing
IP HEADER_CLASSFUL Addressing and Classless addressing
dipalibhole4
 
Tcp ip
Tcp ipTcp ip
Tcp ip
Dhani Ahmad
 
IT307 Exploring the Networks.pptx
IT307 Exploring the Networks.pptxIT307 Exploring the Networks.pptx
IT307 Exploring the Networks.pptx
ShubhamTripathi290909
 
Presentation on network_protocols
Presentation on network_protocolsPresentation on network_protocols
Presentation on network_protocols
IUBAT
 
ICMP-IGMP protocols of Network Layer for ipv4
ICMP-IGMP protocols of Network Layer for ipv4ICMP-IGMP protocols of Network Layer for ipv4
ICMP-IGMP protocols of Network Layer for ipv4
AimanFatima200140
 
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.pptip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
VINAYTANWAR18
 
Transport Layer, Network layer.pptx
Transport Layer, Network layer.pptxTransport Layer, Network layer.pptx
Transport Layer, Network layer.pptx
MuhammadMoosaPanhwar
 
icmp_error_reporting_icmp_protocols.pptx
icmp_error_reporting_icmp_protocols.pptxicmp_error_reporting_icmp_protocols.pptx
icmp_error_reporting_icmp_protocols.pptx
Chaudharyshani2
 
TCPIP SLIDES.ppt
TCPIP SLIDES.pptTCPIP SLIDES.ppt
TCPIP SLIDES.ppt
aymenshykh
 
Computer network coe351- part3-final
Computer network coe351- part3-finalComputer network coe351- part3-final
Computer network coe351- part3-final
Taymoor Nazmy
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layer
Zee Haak
 
data communication protocol
data communication protocoldata communication protocol
data communication protocol
Ramla Sheikh
 
474-22-DatagramForwarding.pptx
474-22-DatagramForwarding.pptx474-22-DatagramForwarding.pptx
474-22-DatagramForwarding.pptx
ThangamaniR3
 
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdf
BIT DURG
 
Chapter 4 internetworking [compatibility mode]
Chapter 4   internetworking [compatibility mode]Chapter 4   internetworking [compatibility mode]
Chapter 4 internetworking [compatibility mode]
Sĩ Anh Nguyễn
 
IP HEADER_CLASSFUL Addressing and Classless addressing
IP HEADER_CLASSFUL Addressing and Classless addressingIP HEADER_CLASSFUL Addressing and Classless addressing
IP HEADER_CLASSFUL Addressing and Classless addressing
dipalibhole4
 
Presentation on network_protocols
Presentation on network_protocolsPresentation on network_protocols
Presentation on network_protocols
IUBAT
 
ICMP-IGMP protocols of Network Layer for ipv4
ICMP-IGMP protocols of Network Layer for ipv4ICMP-IGMP protocols of Network Layer for ipv4
ICMP-IGMP protocols of Network Layer for ipv4
AimanFatima200140
 
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.pptip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
VINAYTANWAR18
 
Ad

More from hamsa nandhini (16)

SOA - Unit 5 - SOA and Business Process Management
SOA - Unit   5 - SOA and Business Process ManagementSOA - Unit   5 - SOA and Business Process Management
SOA - Unit 5 - SOA and Business Process Management
hamsa nandhini
 
SOA - Unit 4 - SOA & Web Services for integration and Multi-Channel access
SOA - Unit   4 - SOA & Web Services for integration and Multi-Channel accessSOA - Unit   4 - SOA & Web Services for integration and Multi-Channel access
SOA - Unit 4 - SOA & Web Services for integration and Multi-Channel access
hamsa nandhini
 
SOA - Unit 3 - SOA and Web Services
SOA - Unit   3 - SOA and Web ServicesSOA - Unit   3 - SOA and Web Services
SOA - Unit 3 - SOA and Web Services
hamsa nandhini
 
SOA - Unit 2 - Service Oriented Architecture
SOA - Unit   2 - Service Oriented ArchitectureSOA - Unit   2 - Service Oriented Architecture
SOA - Unit 2 - Service Oriented Architecture
hamsa nandhini
 
SOA - Unit 1 - Introduction to SOA with Web Services
SOA - Unit   1 - Introduction to SOA with Web ServicesSOA - Unit   1 - Introduction to SOA with Web Services
SOA - Unit 1 - Introduction to SOA with Web Services
hamsa nandhini
 
NP - Unit 2 - Internet Addressing, ARP and RARP
NP - Unit 2 - Internet Addressing, ARP and RARP NP - Unit 2 - Internet Addressing, ARP and RARP
NP - Unit 2 - Internet Addressing, ARP and RARP
hamsa nandhini
 
Web application, cookies and sessions
Web application, cookies and sessionsWeb application, cookies and sessions
Web application, cookies and sessions
hamsa nandhini
 
PHP with MySQL
PHP with MySQLPHP with MySQL
PHP with MySQL
hamsa nandhini
 
Database design and error handling
Database design and error handlingDatabase design and error handling
Database design and error handling
hamsa nandhini
 
Introduction to MySQL in PHP
Introduction to MySQL in PHPIntroduction to MySQL in PHP
Introduction to MySQL in PHP
hamsa nandhini
 
Basics of PHP
Basics of PHPBasics of PHP
Basics of PHP
hamsa nandhini
 
XML Security
XML SecurityXML Security
XML Security
hamsa nandhini
 
SOAP and Web services
SOAP and Web servicesSOAP and Web services
SOAP and Web services
hamsa nandhini
 
XML Technologies
XML TechnologiesXML Technologies
XML Technologies
hamsa nandhini
 
XML DTD and Schema
XML DTD and SchemaXML DTD and Schema
XML DTD and Schema
hamsa nandhini
 
fundamentals of XML
fundamentals of XMLfundamentals of XML
fundamentals of XML
hamsa nandhini
 
SOA - Unit 5 - SOA and Business Process Management
SOA - Unit   5 - SOA and Business Process ManagementSOA - Unit   5 - SOA and Business Process Management
SOA - Unit 5 - SOA and Business Process Management
hamsa nandhini
 
SOA - Unit 4 - SOA & Web Services for integration and Multi-Channel access
SOA - Unit   4 - SOA & Web Services for integration and Multi-Channel accessSOA - Unit   4 - SOA & Web Services for integration and Multi-Channel access
SOA - Unit 4 - SOA & Web Services for integration and Multi-Channel access
hamsa nandhini
 
SOA - Unit 3 - SOA and Web Services
SOA - Unit   3 - SOA and Web ServicesSOA - Unit   3 - SOA and Web Services
SOA - Unit 3 - SOA and Web Services
hamsa nandhini
 
SOA - Unit 2 - Service Oriented Architecture
SOA - Unit   2 - Service Oriented ArchitectureSOA - Unit   2 - Service Oriented Architecture
SOA - Unit 2 - Service Oriented Architecture
hamsa nandhini
 
SOA - Unit 1 - Introduction to SOA with Web Services
SOA - Unit   1 - Introduction to SOA with Web ServicesSOA - Unit   1 - Introduction to SOA with Web Services
SOA - Unit 1 - Introduction to SOA with Web Services
hamsa nandhini
 
NP - Unit 2 - Internet Addressing, ARP and RARP
NP - Unit 2 - Internet Addressing, ARP and RARP NP - Unit 2 - Internet Addressing, ARP and RARP
NP - Unit 2 - Internet Addressing, ARP and RARP
hamsa nandhini
 
Web application, cookies and sessions
Web application, cookies and sessionsWeb application, cookies and sessions
Web application, cookies and sessions
hamsa nandhini
 
Database design and error handling
Database design and error handlingDatabase design and error handling
Database design and error handling
hamsa nandhini
 
Introduction to MySQL in PHP
Introduction to MySQL in PHPIntroduction to MySQL in PHP
Introduction to MySQL in PHP
hamsa nandhini
 
Ad

Recently uploaded (20)

introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Journal of Soft Computing in Civil Engineering
 
Introduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptxIntroduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptx
AS1920
 
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Journal of Soft Computing in Civil Engineering
 
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
charlesdick1345
 
IntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdfIntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdf
Luiz Carneiro
 
Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.
anuragmk56
 
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ijscai
 
International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)
samueljackson3773
 
Degree_of_Automation.pdf for Instrumentation and industrial specialist
Degree_of_Automation.pdf for  Instrumentation  and industrial specialistDegree_of_Automation.pdf for  Instrumentation  and industrial specialist
Degree_of_Automation.pdf for Instrumentation and industrial specialist
shreyabhosale19
 
Introduction to FLUID MECHANICS & KINEMATICS
Introduction to FLUID MECHANICS &  KINEMATICSIntroduction to FLUID MECHANICS &  KINEMATICS
Introduction to FLUID MECHANICS & KINEMATICS
narayanaswamygdas
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
inmishra17121973
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
Mathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdfMathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdf
TalhaShahid49
 
Reagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptxReagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptx
AlejandroOdio
 
Machine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptxMachine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptx
rajeswari89780
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
railway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forgingrailway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forging
Javad Kadkhodapour
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
Introduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptxIntroduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptx
AS1920
 
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
charlesdick1345
 
IntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdfIntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdf
Luiz Carneiro
 
Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.
anuragmk56
 
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ijscai
 
International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)
samueljackson3773
 
Degree_of_Automation.pdf for Instrumentation and industrial specialist
Degree_of_Automation.pdf for  Instrumentation  and industrial specialistDegree_of_Automation.pdf for  Instrumentation  and industrial specialist
Degree_of_Automation.pdf for Instrumentation and industrial specialist
shreyabhosale19
 
Introduction to FLUID MECHANICS & KINEMATICS
Introduction to FLUID MECHANICS &  KINEMATICSIntroduction to FLUID MECHANICS &  KINEMATICS
Introduction to FLUID MECHANICS & KINEMATICS
narayanaswamygdas
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
inmishra17121973
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
Mathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdfMathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdf
TalhaShahid49
 
Reagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptxReagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptx
AlejandroOdio
 
Machine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptxMachine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptx
rajeswari89780
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
railway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forgingrailway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forging
Javad Kadkhodapour
 

NP - Unit 3 - Forwarding Datagram and ICMP

  • 3. Forwarding in an internet • Routing was used with packet switching systems • Forwarding refer to the process of choosing the path for a packet. • Router performs forwarding. • switched Ethernet-the switches are responsible for forwarding Ethernet frames among computers. • The major differences are that in place of frames the Internet accepts and delivers IP datagrams, and in place of Ethernet addresses, the Internet uses IP addresses. Therefore, throughout the chapter, we will restrict the discussion to IP forwarding. • The information IP software uses to make forwarding decisions is known as a Forwarding Information Base(FIB).
  • 4. • Each router has direct connections to two or more networks. • Both hosts and routers participate in forwarding an IP datagram to its destination. • In the figure, two routers connect to the same network as the host. Some internet destinations lie beyond router R1 and other destinations lie beyond R2. The host must decide which router to use for a given datagram. • A router performs transit forwarding, which means the router will accept incoming datagrams from any of the networks to which the router attaches, and will forward each datagram on toward its destination.
  • 5. Direct and Indirect delivery • forwarding into two forms: • direct delivery • indirect delivery. • Direct delivery-the transmission of a datagram from one machine across a single physical network directly to another(both connected directly). • Indirect delivery occurs when the destination of a datagram is not on a directly attached network.
  • 6. Transmission across a single network • Transmission of an IP datagram between two machines on a single physical network does not involve routers. • The sender encapsulates the datagram in a physical frame, binds the next-hop address to a physical hardware address, and sends the resulting frame directly to the destination. • To determine if a destination lies on one of the directly connected networks, IP software extracts the network portion of the destination IP address and compares the network ID to the network ID of its own IP address(es).
  • 7. Indirect delivery • Indirect delivery is more difficult than direct delivery because the sending machine must identify an initial router to handle the datagram. • The router must then forward the datagram on toward the destination network. • Routers in a TCP/IP internet form a cooperative, interconnected structure. Datagrams pass from router to router until they reach a router that can deliver the datagram directly. • Finally, • A host only knows about directly-connected networks; a host relies on routers to transfer datagrams to remote destinations. • Each router knows how to reach all possible destinations in the internet; given a datagram, a router can forward it correctly.
  • 8. Table driven IP forwarding • IP performs datagram forwarding. The IP forwarding algorithm employs a data structure that stores information about possible destinations and how to reach them. • The data structure is known formally as an Internet Protocol forwarding table or IP forwarding table, and informally as simply a forwarding table. • Both hosts and routers have a forwarding table. • If every forwarding table contained information about every possible destination in an internet, it would be impossible to keep the tables current. • Because it allows forwarding to be based on network prefixes, the IP addressing scheme controls the size of forwarding tables.
  • 9. Next-Hop forwarding • A forwarding table contains a set of pairs (N, R), where N is the network prefix for a network in the internet and R is the IP address of the “next” router along the path to network N. • Router R is called the next hop, and the idea of using a forwarding table to store a next hop for each destination is called next-hop forwarding. • the network portion of a destination IP address instead of the complete address keeps forwarding tables small. It helps hide information, keeping the details of specific hosts.
  • 11. Default Routes And A Host Example • If no entry in the table matches the destination address, the forwarding software takes a second step of checking for a default route. • We say that the next hop specified in a default route is a default router. • A default route can be incorporated into a forwarding table. • A default route is especially useful when many destinations lie beyond a single router. • Default routing works especially well for typical host computers that obtain service from an ISP.
  • 13. Host-Specific Routes • Most IP forwarding software allows a host-specific route to be specified as a special case. • Having host-specific routes gives a network administrator more control. • The ability to specify a route for individual machines turns out to have several possible uses: • Control over network use • Testing a new network. • Security
  • 14. The IP Forwarding Algorithm
  • 15. Longest-Prefix Match Paradigm • longest-prefix match - to describe the idea of examining the most specific routes first.
  • 17. Forwarding Tables And IP Addresses • It is important to understand that except for decrementing the hop limit (TTL in IPv4) and recomputing the checksum, IP forwarding does not alter the original datagram. • In the algorithm, the IP address selected by the IP forwarding algorithm is called a next-hop address because it tells where the datagram must be sent next.
  • 18. Handling Incoming Datagrams • host software • router software • four reasons why a host should refrain from performing any forwarding.
  • 19. • Forwarding In The Presence Of Broadcast And Multicast • Software Routers And Sequential Lookup • Establishing Forwarding Tables
  • 20. Internet Protocol: Error And Control Messages (ICMP)
  • 21. Introduction • Connectionless system. • When a datagram arrives, a router forwards or delivers the datagram and then goes on to the next datagram; the router does not coordinate with the original sender of a datagram. • Failures of network and processor hardware, IP cannot deliver a datagram if the destination machine is temporarily or permanently disconnected from the network, if the hop limit expires before a datagram reaches its destination, or if an intermediate router becomes so overloaded that it must discard a datagram.
  • 22. ICMP - Internet Control Message Protocol • allows routers to send error or control messages back to the source of a datagram that caused a problem. • ICMP is primarily intended to inform a source when a datagram sent by the source experiences problems. • ICMP messages are not usually delivered to applications. • ICMP messages are sent to Internet Protocol software on the source computer. That is, when an ICMP error message arrives on a computer, the ICMP software module on the computer handles the message. • The chief advantage of allowing hosts to use ICMP is that it provides a single mechanism used for all control and information messages.
  • 23. Error Reporting Vs. Error Correction • ICMP is an error reporting mechanism • It provides a way for routers that encounter an error to report the error to the original source, but ICMP does not interact with the host nor does ICMP attempt to correct the error. • When a datagram causes an error, ICMP can only report the error condition back to the original source of the datagram; the source must relate the error to an individual application program or take other action to correct the problem.
  • 24. ICMP Message Delivery • Because each ICMP message travels in an IP datagram, two levels of encapsulation are required. • IPv4 uses the PROTOCOL field in the datagram header as a type field. • When an ICMP message is carried in the payload area of an IPv4 datagram, the PROTOCOL field is set to 1. • IPv6 uses the NEXT HEADER field to specify the type of the item being carried. • When an ICMP message is carried in the payload area of an IPv6 datagram, the NEXT HEADER field of the header that is previous to the ICMP message contains 58.
  • 25. ICMP Message Format • Conceptual Layering • TYPE • CODE • CHECKSUM
  • 26. Example ICMP Message Types Used With IPv4
  • 27. Example ICMPv6 message types and the meaning of each.
  • 28. Testing Destination Reachability And Status (Ping) • Ping sends an ICMP Echo Request message to a remote computer. • Any computer that receives an ICMP Echo Request creates an ICMP Echo Reply and returns the reply to the original sender. Echo Request And Reply Message Format: • IPv4 : TYPE 8 – request, 0-reply • IPv6: TYPE request -128 reply-129
  • 29. Checksum Computation And The IPv6 Pseudo-Header
  • 30. Reports Of Unreachable Destinations • Whenever an error prevents a router from forwarding or delivering a datagram, the router sends an ICMP destination unreachable message back to the source and then drops(i.e., discards) the datagram. • Both IPv4 and IPv6 use the same format for destination unreachable messages.
  • 31. The CODE values for an ICMP destination unreachable message
  • 32. ICMP Error Reports Regarding Fragmentation
  • 33. Route Change Requests From Routers • Routers are assumed to know correct routes; hosts begin with minimal routing information and learn new routes from routers
  • 34. Detecting Circular Or Excessively Long Routes • ICMP time exceeded message
  • 35. Reporting Other Problems • parameter problem message
  • 36. Older ICMP Messages Used At Startup • ICMPv6 Router Discovery message