In-depth analysis of traceroute by using the tcpdump command, tcpdumptracerouteYesterday, I was suddenly asked about the traceroute principle. I couldn't say it for a while. Although some commands are often used, I really don't know the actual
Use the tcpdump command to analyze traceroute in DepthTraceroute: indicates the routing commands used to analyze IP packets in Network diagnosis. Preschool knowledge: There is a TTL field in the IP package. This is the maximum number of jumps. Each
I. Origin of ICMPThe best datagram communication service provided by the IP address has no connection service, but it cannot solve the problems of Low-layer datagram loss, duplication, delay or disorder, the TCP Connection Service established on the
From: http://blog.csdn.net/goodboy1881/article/details/670761
--------------------------------------------------------1. imcp Protocol Introduction
As mentioned above, the IP protocol is not a reliable protocol. It does not guarantee that data is
1. imcp Protocol Introduction
As mentioned above, the IP protocol is not a reliable protocol. It does not guarantee that data is delivered. Naturally, the data delivery should be completed by other modules. An important module is the ICMP (Network
Detailed analysis of route tracking command traceroute (1)
The premise for implementing all commands in this article is that you can access the Internet now.
People with a little computer knowledge know the ping command, which is used to check
1. IMCP Protocol IntroductionAs mentioned above, the IP protocol is not a reliable protocol. It does not guarantee that data is delivered. Naturally, the data delivery should be completed by other modules. An important module is the ICMP (Network
The premise of all the commands in this article is: You can surf the internet now.People with a little computer knowledge know that the ping command is used to check whether their host is connected to the destination address, the communication
ICMP protocol
ICMP is often considered an integral part of the IP layer. It is a protocol at the network layer that transmits error messages and other information that requires attention, ICMP packets are usually used by the IP layer or higher
Linux Scan Technical NotesPrefaceHost node of the survival of the detection method, we use the most daily is the ping, in addition to other methods? This article describes fping,hping related operations to detect node survival.The survival of the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.