Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

ICMP- Internet Control Protocol-Chapter 6

2025-01-17 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

ICMP Internet Control Protocol

First of all, I do not have an experimental environment, the understanding of ICMP itself: control data request and response rules, specifications

The diskless system acquires the subnet mask. When using the bootp protocol (BOOTP (Bootstrap Protocol, bootstrap protocol), the predecessor of the dhcp protocol can save the administrator from dividing the ip address of the diskless workstation, and can automatically obtain ip).

The identifier and sequence number in the address mask request reply message are arbitrarily selected by the sender. These values are returned in the reply, and the reply request matches.

Timestamp request reply, which is the number of milliseconds since midnight

One of the rules of U D P is that if you receive a U D P Datagram and the destination port does not match a process in use

Then U D P returns an I C M P unreachable message

ICMP controls the same subnet mask for sending and receiving requests

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report