0% found this document useful (0 votes)
26 views3 pages

ICMP Debugging Tools

Internet Control Message Protocol Debugging Tools Notes

Uploaded by

sthapana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
26 views3 pages

ICMP Debugging Tools

Internet Control Message Protocol Debugging Tools Notes

Uploaded by

sthapana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 3
sae “nl g Tools : 4.14. Debuggin In the Internet many tools can be used for debugg, q it ibility of a rout - We can decide the ey, a router or hos, f route of a packet can be traced. — Following are the tools in which ICMP is Used fo debugging : iy | | 1 Ping | 2. Trace route or Tracert 1.14.1 Ping: } - (Ping program is used to search whether a host js _ tesponding or alive. To the destination, the source host, | ~ sends ICMP echo-request message if it is alive | destination responds with ICMP echo-reply messages, \ — In the echo-request and echo-reply messages the ping program sets the identifier fields and it starts with the sequence number 0. When @ new message is sent, at every time this number is incremented by 1. - Ping can compute the round trip time. In the data section of message it adds the sending time in it. — . After arriving the packet, the round trip time can be calculated as follows : Round trip time = Departure time of packet - Arrival (time of packet = To understand the concept of ping, consider the following example, which shows how we send a ping Message to particular site, © Scanned with OKEN Scanner Example: ~ We will use ping to test the serve, address 192.181.84 with 64 bytes or on MW IP fda, $ Ping xyz edu Ping xye- edu (292.181.8.4-56 (04) bytes of dn a Bytes from Temp oq ; xyz. edu (192.181:8.4) | number | 1] time = 0 [62] 1.92ms bal 1__-| 62 | 1.93ms 64 2 [62| 204ms 64 3 [62] 1.00ms 64 4 | 62 | 1.91ms 64 5 | 62 | 2.00ms 6 6 | 62|201ms = xyt- edu ping statistics is as follows : 1.7 packets are transmitted. 2. 7 packets are received. . 3, 0% packet loss. 4, Minimum ett (round trip time) = 1.90 mS 5. Average rtt = 1.95 mS 6. Maximum rtt = 2.04 mS - The ping starts sending messages from sequence number 0 which gives us RTT time for each probe. = In the IP’ datagram which encapsulates an ICMP message has been set to 62 it means that the packet can travel only upto 62 hops. ~ Ping defines 56 number of data bytes at the beginning and 84 total number of bytes (56 + 8 bytes of ICMP 4 bytes). ~The ping program continues message sending with 64 _ bytes in each probe (56 + 8 = 64 bytes). ~" With interrupt key (ctrl + C) we can stop ping program. ~The statistics of probe is printed after interruption. The header + 20 bytes of IP header Statistics includes the number of sent and received te, packet oss etc, 114.2 Traceroute or Tracort : ~ Grom a soures tothe destination to trace the path of Packet In UNI, the taeeroute moymes e program canbe wed) ute / tracer can search the 1 addresses ofa The outers which are vein ht pa. ~ Usually the program is set for checking of maximum 30 routers (hops) to be visited. = _ Inthe internet normally the number of hops is fess than, this. Traceroute : ~The ping and traceroute programs are different. To get the help the ping program uses two query messages whereas traceroute program uses two error reporting messages namely time-exceeded and destination- unreachable. ~ Thisis application layer program in which only the client program is required. There is no server traceroute program because in the destination host, client program never reaches the application layer. = In @ UDP user datagram the traceroute program is encapsulated. A port nimber which is not available at the destination is intentionally used by traceroute program. ~ . The traceroute sends (n + 1) messages if there are n routers are present in the path. = + Each router discards one message that means the first n messages are discarded and the destination host discards the last message. ~The (n + 1) ICMP error reporting messages received are used by the tracceroute client program for searching the path between the routers. . — Fig. 1141 shows the use of ICMPv4 in traceroute program in which the value of n is automatically found, there is no need to the value of n, WH Tectknoweage raed © Scanned with OKEN Scanner From the host A with TTL value 1 the fist traceroute message is sent, at the frst router (RA) this message '> discarded which sends ICMP time exceeded error message from which the traceroute program will Come to know the IP address of the fist router and the name of router, : With TTL value 2, second traceroute message is sent Which wil find the name and the IP address of second router (R2). Similarly the third and fourth message can find information about R3 and Rd respectively. The fifth message reaches the destination host is also roped but for some another reason, ie. the destination host & cannot be able to find the port number which is specified in the UDP datagram. Then ICMP sends the destination-unreachable message with code 3 which shows that the port number is not found. The traceroute program after receiving destination- Source A, unreachable message wil come tO KNOW that the destination is reached. _ To find the name of the final destination and IP it uses the data in the received message, Hence Fig. 1141 value of nis 4. To find the destination and the round trip time for router the traceroute program sets 3 timer, ‘To find better estimate for round trip time most of the traceroute programs sends three messages with the same TTL value to each device. Tracert : In Windows, the tracert program is used which behaves differently than ping and traceroute. In IP datagrams the tracert program is directly encapsulated. ilar to traceroute, the tracert sends echo request messages to routers, when last echo request reaches. the destination an echo reply message is received. Destination B (G-2530) Fig. 1.14.1 : Concept of traceroute © Scanned with OKEN Scanner

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy