Article Title: code for implementing ICMP monitoring using Delphi. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Remote monitoring is an effective measure for us to manage settings and networks. This method has been introduc
Remote monitoring is an effective measure for us to manage settings and networks. This method has been introduced into more and more fields. Here we will introduce how to use ICMP to detect the status of remote hosts in Delphi. In network communication, you often need to determine whether the remote host is alive to determine the next operation. You can directly use the
First, login Zabbix server to do the following operations:
1.fping Installation
wget http://www.fping.org/dist/fping-3.16.tar.gz
Tar zxvf fping-3.16.tar.gz
CD fping-3.16
./configure--prefix=/usr/local/fping/
Make make install
2. Modify the zabbix_server.conf configuration file
# Zabbix-server-side profile path installed in Yum modeVim/etc/zabbix/zabbix_server.conf
Modify the Fpinglocation path to the fping path you just installed.
Fpinglocation=/usr/local/fping/sbin/fping
If you do not modify t
Linux ICMP feature Analysis one ICMP protocol-related format
The ICMP protocol is a very important protocol in the network layer, it is called the Internet Control Message Protocol (Internet controlling messaging Protocol), the ICMP protocol makes up the lack of IP, it uses IP protocol to transmit information, Provide
ICMP is an Internet Control Messaging Protocol (PROTOCOL). It is a child protocol of the TCP/IP protocol family that is used to pass control messages between IP hosts and routers. Control message refers to network communication, whether the host is up to, whether the route is available or not. Although these control messages do not transmit user data, they play an important role in the transfer of user data.
The function and characteristics of
First, ICMP introduction
The full name of ICMP is the Internet Control message Protocol (inter-Network Messaging protocol), an integral part of IP, used to provide error reporting. Once the various types of errors are found to return them to the original host, our most common ping command is based on ICMP.
|-----------------------------------------| || ------
In the analysis of the previous section, 3 questions were left:
Before parsing the ICMP packet processing process, I have the following questions:
1. Why to create a socket for each CPU only to send ICMP messages, do not use the socket can also send ICMP messages out.
2. What is the working principle of ping?
3. What is the working principle of traceroute?
1, for
Linux original socket (2)-icmp request and receipt, linux-icmp
I. Overview
The previous arp request used the original socket of the link layer. Icmp is encapsulated in ip datagram, so icmp requests can directly use the original socket at the network layer, that is, the first parameter of socket () is PF_INET. As follow
Use ICMP tunneling technology for ICMP encapsulation and penetration Firewall
0x00 icmp Tunneling Technology
ICMP tunneling technology, also known as Ping tunneling technology, we know that the ping protocol is icmp. When the firewall receives a protocol package, it is relea
ICMP is (Internet Control message Protocol) Internet controlled message protocol. It is a sub-protocol of the TCP/IP protocol family that is used to pass control messages between IP hosts and routers. The control message refers to the message that the network is not accessible, whether the host is available, whether the route is available, and so on. These control messages, while not transmitting user data, play an important role in the delivery of u
I. Overview:
1. ICMP allows the host or route to report errors and provide relevant exceptions. ICMP is a standard protocol for the Internet, but ICMP is not a high-level protocol, but an IP layer protocol. Generally, ICMP packets are used by the IP layer or higher-level protocols (TCP or UDP. Some
label: SP Div art for using Ar data in style HTTP
一.概述:
1.ICMP同意主机或路由报告差错情况和提供有关异常情况。ICMP是因特网的标准协议,但ICMP不是高层协议,而是IP层的协议。通常ICMP报文被IP层或更高层协议(TCP或UDP)使用。一些ICMP报文把差错报文返回给用户进程。
2.ICMP报文作为IP层数据报的数据,加上数据报的首部,组成数据报发送出去。
3.
Swiss Army Knife protocol-ICMP
ICMP protocol
An important supplement to the IP protocol is the ICMP protocol. ICMP (Internet Control Message Protocol) is a Protocol between the network layer and the transport layer. Its main function is to transmit network diagnostic information.
Many people may misunderstand the ICMP protocol, especially in terms of security. So what do we think about ICMP security? We will discuss this issue in detail today. For more information, see the following section.
1. Security importance of ICMP
The characteristics of the ICMP protocol determine that it is very easy t
ICMP is one of the most important protocols in network protocols. It implements some effective message control to complete some transmission errors. So how should we understand this agreement? What is its workflow?
Since the IP network is unreliable and cannot guarantee information transmission, it is important to notify the sender when a problem occurs. ICMP is a mechanism for providing network fault probl
Security is a problem that we can never ignore, especially network security, which is not easy to control. Let's talk about ICMP protocol security in detail, I hope you can refer to some of the content in this article.
1. Security importance of ICMP
The characteristics of the ICMP protocol determine that it is very easy to be used to attack routers and hosts on t
command uses the IP lifetime (TTL) field and ICMP error messages to determine routes from one host to another host on the network.
Tracert Working principle
The Tracert diagnostics determine the route to the destination by sending an Internet Control Message Protocol (ICMP) response packet to the destination with different IP time to live (TTL) values. Requires that each router on the path decrements at le
ICMP redirection PrincipleICMP redirection is one of ICMP control packets. Under certain circumstances, when a router detects that a machine uses a non-optimized route, it will send an ICMP redirection packet to the host and request the host to change the route. The router also forwards the initial datagram to its destination.ICMP Application Analysis-
I. Overview:
1. ICMP agrees to report errors on the host or route and provides relevant exceptions. ICMP is a standard protocol for the Internet, but ICMP is not a high-level protocol, but an IP layer protocol. Generally, ICMP packets are used by the IP layer or higher-level protocols (TCP or UDP. Some
// ICMP HeaderTypedef struct _ tagx_icmphdr{Unsigned char I _type; // typeUnsigned char I _code; // codeUnsigned short I _cksum; // checkUnsigned short I _id; // identifierUnsigned short I _seq; // serial numberUnsigned long I _timestamp; // current time = (unsigned long): gettickcount ();
} Xicmpheader;
The first 32bits of various ICMP packets are three fixed-length fields: Type field (8 bits), Code field
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.