![]() ![]() As you might have guessed (given that this lab is about ICMP), both of these Ping packets are ICMP packets. The Ping program in the source host sends a packet to the target IP address if the target is live, the Ping program in the target host responds by sending a packet back to the source host. You may recall that the Ping program is simple tool that allows anyone (for example, a network administrator) to verify if a host is live or not. Let’s begin our ICMP adventure by capturing the packets generated by the Ping program. However, it is straightforward to translate the lab to a Unix or Linux environment. We present this lab in the context of the Microsoft Windows operating system. The format and contents of an ICMP message.īefore attacking this lab, you’re encouraged to review the ICMP material in section 4.4.3 of the text. ICMP messages generated by the Traceroute program ICMP messages generating by the Ping program In this lab, we’ll explore several aspects of the ICMP protocol: Involve me and I understand.” Chinese proverb Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |