ICMP ARP and ICMP
5.3.2 ICMP
The first kind of ICMP packet most people think of is a ping. The ping function is an echo request and response facility that allows one to test whether certain devices are reachable on the network. ICMP actually has a wide range of other uses, particularly for reporting network errors. The ping function is relatively simple. One device sends an ICMP echo request packet to another. The receiving device then responds to this packet with an echo response. This response has many uses, particularly in network management. It is also frequently used by applications that want to verify that a server is available before starting a session. For network management, it provides a simple way to measure end-to-end latency in the network—by taking the time difference between sending the request and receiving the response packet. ICMP packets also provide a way to report several important error conditions. For example, one fairly common error situation is to have a packet dropped because there is no route available to the destination. Another important example is when an IP packet is too large to pass through a particular section of the network. Ordinarily, this is not a problem because the router simply breaks up the packet into fragments and passes it along. However, some applications set a flag in their packets to prevent them from being fragmented. In this case, the router has no choice but to drop the packet. In each of these cases, the router that drops the packet alerts the source device of the problem by sending a special ICMP message. This message allows the application or the user to take appropriate action to fix the problem. In the case of the large packet, the router might simply try again using smaller packets, for example. Another common and important type of ICMP message is the ICMP Redirect. The redirect is most frequently seen when two or more routers are on the same network segment as the end device. If these routers handle different sets of IP addresses, the end device could inadvertently send a packet to the wrong router. This is particularly common if one of the routers is configured as the default gateway for the end device. When this happens, the first router simply forwards the packet over to the other router and sends an ICMP redirect message. This message tells the end device that it has delivered the packet, but that, for future reference, another router has a more direct path. The end device should then update its internal routing table to use this second router the next time it sends such a packet. This issue is particularly important for the network designer to understand because some devices do not respond correctly to ICMP redirection. In these cases, it is often necessary to configure the routers to not send these messages and just to forward the packets. Otherwise, the segment can suffer from extra congestion due to all of the redirection messages—one for every application packet. In general, I prefer to only have one router on any end device segment, configured as the default gateway for all end devices. As Ive mentioned earlier, this router can be made redundant by adding a second router and using HSRP or VRRP. As far as the end devices are concerned, there is only one way off the segment. Network segments built this way should never see any ICMP Redirect messages.5.4 Network Address Translation
Parts
» Money Geography Business Requirements
» Installed Base Bandwidth Business Requirements
» Layer 1 Layer 2 The Seven Layers
» Layer 3 Layer 4 The Seven Layers
» Layer 5 Layer 6 Layer 7 The Seven Layers
» Routing Versus Bridging Networking Objectives
» Top-Down Design Philosophy Networking Objectives
» Failure Is a Reliability Issue
» Performance Is a Reliability Issue
» Guidelines for Implementing Redundancy
» Redundancy by Protocol Layer
» Multiple Simultaneous Failures Complexity and Manageability
» Always let network equipment perform network functions Intrinsic versus external automation
» Examples of automated fault recovery
» Fault tolerance through load balancing
» Avoid manual fault-recovery systems
» Isolating Single Points of Failure
» Multiple simultaneous failures Predicting Your Most Common Failures
» Combining MTBF values Predicting Your Most Common Failures
» Traffic Anomalies Failure Modes
» Software Problems Human Error
» Ring topology Basic Concepts
» Star topology Basic Concepts
» Mesh Topology Basic Concepts
» Spanning Tree eliminates loops Spanning Tree activates backup links and devices
» Protocol-Based VLAN Systems VLANs
» Why collapse a backbone? Backbone capacity
» Backbone redundancy Collapsed Backbone
» Trunk capacity Distributed Backbone
» Trunk fault tolerance Distributed Backbone
» Ancient history Switching Versus Routing
» One-armed routers and Layer 3 switches
» Filtering for security Filtering
» Filtering for application control
» Containing broadcasts Switching and Bridging Strategies
» Redundancy in bridged networks Filtering
» Trunk design VLAN-Based Topologies
» VLAN Distribution Areas VLAN-Based Topologies
» Sizing VLAN Distribution Areas
» Multiple Connections Implementing Reliability
» Routers in the Distribution Level Routers in Both the Core and Distribution Levels
» Connecting Remote Sites Large-Scale LAN Topologies
» General Comments on Large-Scale Topology
» Cost Efficiency Selecting Appropriate LAN Technology
» Installed Base Maintainability Selecting Appropriate LAN Technology
» Ethernet addresses Ethernet Framing Standards
» Collision Detection Ethernet and Fast Ethernet
» Transceivers Ethernet and Fast Ethernet
» FDDI Local Area Network Technologies
» Wireless Local Area Network Technologies
» Firewalls and Gateways Local Area Network Technologies
» Horizontal Cabling Structured Cabling
» Vertical Cabling Structured Cabling
» Network Address Translation IP
» Multiple Subnet Broadcast IP
» Unregistered Addresses General IP Design Strategies
» Easily summarized ranges of addresses
» Sufficient capacity in each range
» Standard subnet masks for common uses
» The Default Gateway Question
» Types of Dynamic Routing Protocols
» Split Horizons in RIP Variable Subnet Masks
» Basic Functionality IGRP and EIGRP
» Active and Stuck-in-Active Routes
» Interconnecting Autonomous Systems IGRP and EIGRP
» Interconnecting Autonomous Systems OSPF
» Redistributing with Other Routing Protocols
» IP Addressing Schemes for OSPF OSPF Costs
» Autonomous System Numbers BGP
» IPX Addressing Schemes General IPX Design Strategies
» RIP and SAP Accumulation Zones
» Using Equipment Features Effectively
» Hop Counts Elements of Efficiency
» Bottlenecks and Congestion Elements of Efficiency
» Filtering Elements of Efficiency
» QoS Basics Quality of Service and Traffic Shaping
» Layer 2 and Layer 3 QoS Buffering and Queuing
» Assured Forwarding in Differentiated Services
» Traffic Shaping Quality of Service and Traffic Shaping
» Defining Traffic Types Quality of Service and Traffic Shaping
» RSVP Quality of Service and Traffic Shaping
» Network-Design Considerations Quality of Service and Traffic Shaping
» Configuration Management Network-Management Components
» Fault Management Performance Management Security Management
» Designing a Manageable Network
» VLAN structures Architectural Problems
» LAN extension Architectural Problems
» Redundancy features Architectural Problems
» Out-of-Band Management Techniques Management Problems
» Multicast Addressing IP Multicast Networks
» Multicast Services IP Multicast Networks
» Group Membership IP Multicast Networks
» Multicast administrative zones Network-Design Considerations for Multicast Networks
» Multicast and QoS Network-Design Considerations for Multicast Networks
Show more