the original IP header and data portion that caused the ICMP error message to be generated (such as UDP or TCP for the transport layer, which contains the port number). Here the original IP header of the Protocol field and the first 8 bytes of the port number, you can determine which protocol and which user process.In addition to the ICMP error message above, the ICMP error message is no longer generated,
host (Do you still remember what TTL is ?) After the first router receives the packet, the TTL is automatically reduced by 1 and the TTL is changed to 0, the router discards the packet and generates an ICMP datagram that is inaccessible to the host. After receiving the datagram, the host sends a UDP datagram with TTL = 2 to the target host, and then stimulates the second router to send an ICMP data report to the host. Until the target host is reached. In this way,
1. imcp Protocol Introduction
As mentioned above, the IP protocol is not a reliable protocol. It does not guarantee that data is delivered. Naturally, the data delivery should be completed by other modules. An important module is the ICMP (Network Control Packet) protocol.
When an error occurs when an IP packet is tran
discard the packet, and at the same time produce a host unreachable ICMP datagram to the host. The host receives this datagram and sends a ttl=2 UDP datagram to the destination host, then stimulates the second router to send ICMP datagrams to the host. This is repeated until the destination host is reached. In this way, traceroute gets all the router IPs. This avoids the problem that the IP header can only record limited routed IP.Someone asked, how
very interesting, it receives the IP of the destination host, first sends a ttl=1 to the destination host (remember what TTL is?). UDP (the next to know what UDP is the packet), and after the first router receives the packet, the TTL is automatically reduced by 1, and the TTL becomes 0, the router discards the packet, and simultaneously produces a time-out ICMP datagram to the host. The host receives this datagram and sends a ttl=2 UDP datagram to the destination host, then stimulates the secon
1. IMCP Protocol IntroductionAs mentioned above, the IP protocol is not a reliable protocol. It does not guarantee that data is delivered. Naturally, the data delivery should be completed by other modules. An important module is the ICMP (Network Control Packet) protocol.When an error occurs when an IP packet is transmitted, such as host failure or route failure,
of two TCP/IP systems during ping. It only uses ICMP echo requests and echo response packets, instead of passing through the transport layer, the ping SERVER is generally used to test the ICMP function in the kernel. When a website cannot be accessed, We can ping the website to check the connectivity. For example:
Ping the google server first. We can see that the connectivity is not very good, the packet loss rate is 50%, and We ping the Github server. The connectivity is good, and the packe
troubleshooting function.-F sets the TTL value of the first detected data packet.-F: Do not disconnect the bits.-G: You can set up to eight source route gateways.-I uses the specified network interface to send data packets.-I replace UDP data with ICMP response.-M: sets the maximum TTL value of the packet to be detected.-N directly uses the IP address rather than the host name.-P: Set the communication port of UDP transmission protocol.-R ignores com
) ip addresses is 9.
-K computer-list
Route data packets using the computer list specified by computer-list. The maximum number of ip addresses allowed by consecutive computers to be separated by intermediate gateways (strictly source routes) is 9.
-W timeout
Specify the timeout interval, in milliseconds.
Destination-list
Specify the remote computer to be pinged.
C: //> ping ds.internic.net
Pinging ds.internic.net [192.20.239.132] with 32 bytes of data: (192.20.239.132 his IP address)
Reply from
separate.Specific parameter format: traceroute [-dflnrvx][-f
3. Command parameters:
-D uses the socket-level debugging feature.-F Sets the size of the live value TTL for the first detection packet.-F setting does not leave the fault position.-G Sets the source routing gateway, up to 8.-I sends out packets using the specified network interface.-I replaces UDP data information with an ICMP response.-M sets the size of the maximum surviving value TTL
Command for viewing Ubuntu running status
1. route to view and set the route information for Linux 2. ping: network connectivity check example: Ping 192.168.0.1 parameter:-C is used to specify the number of Ping responses. Example: Ping-C 4 192.168.0.1 the specified number of responses is 4 3. traceroute is used to analyze the network topology format: Traceroute Remote Host IP address or domain name 4. net
uses the socket-level troubleshooting feature.-F Sets the size of the live value TTL for the first instrumented packet.-F set do not leave the break.-G Sets the source routing gateway, which can be set to a maximum of 8.-I sends out the packet using the specified network interface.-I replaces UDP data information with an ICMP response.-M sets the size of the maximum surviving value TTL for the detection packet.-N uses the IP address directly instead of the host name.-P Sets the communication po
Ping, tracert, traceroute, and netstat command to view the ubuntu running status command 1. route to view and set the route information for Linux 2. ping: network connectivity check example: ping 192.168.0.1 parameter:-c is used to specify the number of ping responses. Example: ping-c 4 192.168.0.1 the specified number of responses is 4 3. traceroute is used to analyze the network topology format:
the socket-level troubleshooting function-F Sets the size of the surviving value TTL for the first instrumented packet-F settings do not leave the Duan----I do not know what is not to leave the Duan, checked the next did not find what information ^ ^-G Set source routing gateway with up to 8-I send out packets using the specified network interface-I replaces UDP data information with ICMP response-M sets the size of the maximum surviving value TTL for the detection packet-N Direct use of IP add
uses the socket-level troubleshooting feature.-F Sets the size of the live value TTL for the first instrumented packet.-F set do not leave the break.-G Sets the source routing gateway, which can be set to a maximum of 8.-I sends out the packet using the specified network interface.-I replaces UDP data information with an ICMP response.-M sets the size of the maximum surviving value TTL for the detection packet.-N uses the IP address directly instead of the host name.-P Sets the communication po
user.Specific parameter format: traceroute [-dflnrvx][-f3. Command parameters:-D uses the socket-level troubleshooting feature.-F Sets the size of the live value TTL for the first instrumented packet.-F set do not leave the break.-G Sets the source routing gateway, which can be set to a maximum of 8.-I sends out the packet using the specified network interface.-I replaces UDP data information with an ICMP response.-M sets the size of the maximum surv
Mtr (My traceroute) is a Network Diagnostics tool that incorporates ping and traceroute into a program. The MTR provides two interfaces: a ncurses interface that is useful for using MTR from a Telnet session, and a GTK + interface for X (provided in the MTR-GTK software package).MTR use1, MTR command line toolsMTR use is relatively simple, please refer to MTR's man page for detailed usage.[root@ts3-142 ~]#
The difference between traceroute and tracert. Difference between traceroute and tracert recently, when I checked TCPIP details Volume 1, the traceroute and tracert commands gave me a little pitfall. The two were actually different. I captured packets in windows. what is the difference between traceroute and tracert?
R
The difference between traceroute and tracert
Recently in the view of TCP/IP detailed Volume 1 o'clock was traceroute and tracert command to a small hole, the original two is a difference.
I grabbed the bag under windows, and I couldn't catch the UDP packet ....
Also give yourself a wake up reading to move brain Ah!!!
Both are used to probe packets from the source to the destination routed IP, but the two
space for the IP address manifest, and have the router populate the items in that list. The value of the Code field of the relaxed source-station route is 0x83; the value of the strict source-station route is 0x89.Extended traceroute OptionsR1#traceroute Protocol [IP]://Specify protocol type target IP address:////////
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.