answersLogoWhite

0


Best Answer

All ICMP Error Messages

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which ICMP message contain part of the ip datagram?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

What happens if part of an FTP message is not delivered to the destination?

If part of an FTP message is not delivered to the destination, then the part of the FTP message that was lost is re-sent.


What happens when part of a message using tcp is not delivered to the destination host?

The part of the message that is missing is retransmitted.


How does SMTP mark the end of a message body?

The HTTP protocol simply declares the entire length of the message in part of the header called "Content-length header field".


What are the pieces of communication in UDP called?

UDP, or User Datagram Protocol is a very simple communication protocol. It is a part of the Transport Layer of the OSI model - the same as the well known TCP. UDP is very straight forward, containing very few features. There is no hand shaking, no security, no ordering of packets and very little error detection (if any at all). The structure of a UDP packet is as follows: Bits 0-15: Source Port Number (optional - leave as all zeros if unused) Bits 16-31: Destination Port Number Bits 32-47: The length of the entire UDP datagram (note that the maximum size is 2^16-1) Bits 48-63: The checksum (optional under IPv4 - leave as all zeros if unused) Bits 64-??: The actual data. About the checksum: this is the confusing part about UDP. When a checksum is computed, the UDP software creates a fake header to include in the checksum calculation - but this fake header is not actually transmitted. The structure of this fake header (officially called the "pseudo header") is: For IPv4: Bits 0-31: Source IP address (taken from the IP header) Bits 32-63: Destination IP address (taken from the IP header) Bits 64-71: Reserved - leave as all zeros Bits 72-79: Protocol (taken from the IP header) Bits 80-95: Length (taken from the UDP datagram) Bits 96-??: The UDP datagram described above. For IPv6: Bits 0-127: Source IP address Bits 128-255: Destination IP Address Bits 256-287: Length Bits 288-311: Reserved (leave as all zeros) Bits 312-319: Next header Bits 320-???: The UDP datagram described above NOTES: -this is only the structure of the UDP packet - and does not include the IP header. -Since it is possible for the checksum to end up as 0, the standard dictates that a checksum of zero be changed to 0xFFFF in order not to confuse with a checksum field which is disabled. This is true even under IPv6, where the checksum MUST be used. A checksum field value of zero is an error and the datagram should be discarded. -UDP makes no guarantees that the datagram will arrive, nor does it make any guarantees about the order that the datagram arrives in. If the user wants these features, then these will need to be implemented by the applications using UDP to communicate, or use a different communication protocol such as TCP.


A host sent a message that all other hosts on the local network received and processed What type of domain are all these hosts a part of?

broadcast domain

Related questions

Which protocal is required on any computer that communicates across the internet?

IP, or Internet Protocol, is required to use the public Internet. While sometimes called "TCP/IP", TCP-Transmission Control Protocol-is only one part of the Internet Protocol suite, which includes many others, such as UDP (User Datagram Protocol), ICMP (Internet Control Message Protocol), etc.


What are the disadvantages of treating this event as an error discarding the packet and sending an ICMP message?

The IPv6 specification allows routers to ignore Flow Labels and also allows for the possibility that IPv6 datagrams may carry flow setup information in their options. Unknown Flow Labels may also occur if a router crashes and loses its state. During a recovery period, the router will receive datagrams with Flow Labels it does not know, but this is arguably not an error, but rather a part of the recovery period. Finally, if the controversial suggestion that each TCP connection be assigned a separate Flow Label is adopted, it may be necessary to manage Flow Labels using an LRU cache (to avoid Flow Label cache overflow in routers), in which case an active but infrequently used flow's state may have been intentionally discarded. In any case, it is clear that treating this situation as an error and, say dropping the datagram and sending an ICMP message, is inappropriate. Indeed, it seems likely that in most cases, simply forwarding the datagram as one would a datagram with a zero Flow Label would give better service to the flow than dropping the datagram.


What is an echo request relative to computer networking?

Part of the ICMP protocol that requests a reply from a computer.


Why do some emails get sent back from Mailer Deamon?

Some reasons for the emails to get sent back from Mailer Deamon are - the first part might contain the reason for the bounce or the second part might contain original message.


Which part of a friendly letter contains your message?

The part that contains your message is the body.


What happens if part of an FTP message is not delivered to the destination?

If part of an FTP message is not delivered to the destination, then the part of the FTP message that was lost is re-sent.


What is the function of the command - Is?

The function of the ping command is to see whether you can reach a particular machine. Your machine sends a special message, and the other machine replies. Ping is part of the ICMP protocol.Example 1:ping 10.0.0.7This check whether you can reach this specific address.Example 2:ping wiki.answers.comThis only works if DNS is working. If DNS does work, the ping will go ahead testing connectivity to the corresponding IP address.The function of the ping command is to see whether you can reach a particular machine. Your machine sends a special message, and the other machine replies. Ping is part of the ICMP protocol.Example 1:ping 10.0.0.7This check whether you can reach this specific address.Example 2:ping wiki.answers.comThis only works if DNS is working. If DNS does work, the ping will go ahead testing connectivity to the corresponding IP address.The function of the ping command is to see whether you can reach a particular machine. Your machine sends a special message, and the other machine replies. Ping is part of the ICMP protocol.Example 1:ping 10.0.0.7This check whether you can reach this specific address.Example 2:ping wiki.answers.comThis only works if DNS is working. If DNS does work, the ping will go ahead testing connectivity to the corresponding IP address.The function of the ping command is to see whether you can reach a particular machine. Your machine sends a special message, and the other machine replies. Ping is part of the ICMP protocol.Example 1:ping 10.0.0.7This check whether you can reach this specific address.Example 2:ping wiki.answers.comThis only works if DNS is working. If DNS does work, the ping will go ahead testing connectivity to the corresponding IP address.


What part of a story touches your heart?

The inspirational part of a story would touch the reader's heart. Not all stories are inspirational. Not all stories contain inspiring sections or an inspirational message, whether directly or indirectly.


The part of an email message that describes the message is the?

A: subject line


What happens when part of a message using tcp is not delivered to the destination host?

The part of the message that is missing is retransmitted.


What part of speech is the word contain?

The word contain is a verb (to contain).


The part of the email message that describes the message is the?

HEADER – Address – subject – Attachment – Message – signature Line