Monday, 31 March 2014
PING
What is ping ?
Why to use PING ?
Syntax of PING ?
Ping is a computer network administration utility used to
test the reachability of a host on an Internet Protocol (IP) network and to
measure the round-trip time for messages sent from the originating host to a
destination computer. The name comes from active sonar terminology which sends
a pulse of sound and listens for the echo to detect objects underwater.
Ping operates by sending Internet Control Message Protocol
(ICMP) echo request packets to the target host and waiting for an ICMP
response. In the process it measures the time from transmission to reception
(round-trip time) and records any packet loss. The results of the test are
printed in the form of a statistical summary of the response packets received,
including the minimum, maximum, and the mean round-trip times, and sometimes
the standard deviation of the mean.
Depending on actual implementation, the ping utility may be
executed with various command-line switches to enable special operational
modes. For example, options include specifying the packet size of the probe,
automatic repeated operation for sending a specified count of probes, and time
stamping.
Many operating systems provide a companion utility, ping6,
for probing Internet Protocol version 6 (IPv6) hosts, but some systems may
include this capability in ping.
Ping may be abused as a simple form of denial-of-service
attack in the form of a ping flood, in which the attacker overwhelms the victim
with ICMP echo request packets.
History
The ping utility was authored by Mike Muuss in December 1983
as a tool to troubleshoot problems in an IP network. He was inspired by a
remark by David Mills on using ICMP echo packets for IP network diagnosis and
measurements. Mike named it after the sound that sonar makes, since its
methodology is similar to sonar's echo location.
Host discovery or ping scanning or ping sweep is a feature
of network scanning tools, such as nmap.
RFC 1122 prescribes that any host must process an
echo-request and issue an echo-reply in return This has been characterized as a
security risk.
Sample ping test
The following is the output of running ping with the target
www.example.com for five probes.
Syntax :Type ping
<hostname> or ping
<IP address>.
The utility summarizes its results after completing the ping
probes. The shortest round trip time was 9.674 ms, the average was 10.968 ms,
and the maximum value was 11.726 ms. The measurement had a standard deviation
of 0.748 ms.
Message format
ICMP packet
IP Datagram
|
||||
|
Bits 0–7
|
Bits 8–15
|
Bits 16–23
|
Bits 24–31
|
IP Header
(20 bytes) |
Version/IHL
|
Type of service
|
Length
|
|
Identification
|
flags and offset
|
|||
Time To Live (TTL)
|
Protocol
|
Checksum
|
||
Source IP address
|
||||
Destination IP address
|
||||
ICMP Header
(8 bytes) |
Type of message
|
Code
|
Checksum
|
|
Header Data
|
||||
ICMP Payload
(optional) |
Payload Data
|
Generic composition of an ICMP 32-byte packet:[6]
·
IP Header
(in blue): Protocol set to 1 (ICMP) and
Type of Service set to 0.
·
ICMP
Header (in red): Type of ICMP message (8 bits)
Code (8 bits)
Checksum (16 bits),
calculated with the ICMP part of the packet (the IP header is not used). It is
the 16-bit one's complement of the one's complement sum of the ICMP message
starting with the Type field[7]
Header Data (32 bits)
field, which in this case (ICMP echo request and replies), will be composed
of identifier (16 bits) and sequence number (16 bits).
ICMP Payload
Payload for the different kind of answers; can be an
arbitrary length, left to implementation detail. However, the packet including
IP and ICMP headers must be less than the maximum transmission unit of the
network or risk being fragmented.
Data Transportation
Echo request
The echo request ("ping") is an ICMP message whose
data is expected to be received back in an echo reply ("pong"). The
host must respond to all echo requests with an echo reply containing the exact
data received in the request message.
00
|
01
|
02
|
03
|
04
|
05
|
06
|
07
|
08
|
09
|
10
|
11
|
12
|
13
|
14
|
15
|
16
|
17
|
18
|
19
|
20
|
21
|
22
|
23
|
24
|
25
|
26
|
27
|
28
|
29
|
30
|
31
|
Type = 8
|
Code = 0
|
Header Checksum
|
|||||||||||||||||||||||||||||
Identifier
|
Sequence Number
|
||||||||||||||||||||||||||||||
Data
|
The Identifier and Sequence Number can be used by the client
to match the reply with the request that caused the reply. In practice, most
Linux systems use a unique identifier for every ping process, and sequence
number is an increasing number within that process. Windows uses a fixed
identifier, which varies between Windows versions, and a sequence number that
is only reset at boot time.
The data received in the Echo Request must be entirely
included in the Echo Reply.
Echo reply
The echo reply ("pong") is an ICMP message
generated in response to an echo request, and is mandatory for all hosts and
routers.
00
|
01
|
02
|
03
|
04
|
05
|
06
|
07
|
08
|
09
|
10
|
11
|
12
|
13
|
14
|
15
|
16
|
17
|
18
|
19
|
20
|
21
|
22
|
23
|
24
|
25
|
26
|
27
|
28
|
29
|
30
|
31
|
Type = 0
|
Code = 0
|
Header Checksum
|
|||||||||||||||||||||||||||||
Identifier
|
Sequence Number
|
||||||||||||||||||||||||||||||
Data
|
Type and code must be set to 0.
The identifier and sequence number can be used by the client
to determine which echo requests are associated with the echo replies.
The data received in the echo request must be entirely
included in the echo reply.
Possible reply messages include the following:
H, !N, or !P – host, network or protocol unreachable
S – source route failed
F – fragmentation needed
U or !W – destination network/host unknown
I – source host is isolated
A – communication with destination network administratively
prohibited
Z – communication with destination host administratively
prohibited
Q – for this ToS the destination network is unreachable
T – for this ToS the destination host is unreachable
X – communication administratively prohibited
V – host precedence violation
C – precedence cutoff in effect.
Sunday, 30 March 2014
A Detail Explanation of PORT NUMBERS..
Port number
Well-known port number
Registered port numbers
Port number
A port number is a way to identify a specific process to which an
Internet or other network message is to be forwarded when it arrives at a server. For the Transmission Control
Protocol and the User Datagram Protocol, a port number is a 16-bit integer that is put in the header appended to
a message unit. This port number is passed logically between client and server transport layers and
physically between the transport layer and the Internet Protocol layer and forwarded on.
For example, a request from a client (perhaps on behalf of you at
your PC) to a server on the Internet may request a file be served from that
host's File Transfer Protocol (FTP) server or process. In order to pass your
request to the FTP process in the remote server, the Transmission Control
Protocol (TCP) software layer in your computer identifies the port number of 21
(which by convention is associated with an FTP request) in the 16-bit port
number integer that is appended to your request. At the server, the TCP layer
will read the port number of 21 and forward your request to the FTP program at
the server.
Some services or processes have conventionally assigned permanent
port numbers. These are known as well-known
port numbers. In other cases, a port number is assigned temporarily (for the
duration of the request and its completion) from a range of assigned port
numbers. This is called an ephemeral port number.
Port numbers are assigned in various ways, based on three ranges:
System Ports / Well-Known Ports (0-1023)
User Ports / Registered
Ports (1024-49151) and
Dynamic Ports / Private Ports (49152-65535)
Well-known port number
The well-known port numbers are the port numbers that are reserved for
assignment by the Internet Corporation for Assigned Names and Numbers (ICANN)
for use by the application end points that communicate using the Internet's
Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP). Each
kind of application has a designated (and thus "well-known") port
number. For example, a remote job entry application has the port number of 5;
the Hypertext Transfer Protocol (HTTP) application has the port number of 80;
and the Post Office Protocol Version 3 (POP3) application, commonly used for
e-mail delivery, has the port number of 110. When one application communicates
with another application at another host computer on the Internet, it specifies
that application in each data transmission by using its port number.
The well-known ports cover the range of possible port numbers from
0 through 1023. The registered ports are numbered from 1024 through 49151. The
remaining ports, referred to as dynamic ports or private ports, are numbered
from 49152 through 65535.
On most systems, a well-known port number can only be used by a
system (root) process or by a program run by a privileged
user.
Registered port numbers
The registered port numbers are the port numbers that companies and other
users register with the Internet Corporation for Assigned Names and Numbers (ICANN)
for use by the applications that communicate using the Internet's Transmission
Control Protocol (TCP) or the User Datagram Protocol (UDP). In most cases,
these applications run as ordinary programs that can be started by non privileged
users. The registered port numbers are in the range from 1024 through 49151.
They follow in sequence the well-known
port numbers, which are, in most cases, applications that can only be started
by privileged users, such as the Hypertext Transfer Protocol (HTTP) and Post
Office Protocol Version 3 (POP3) applications. When one application
communicates with another application at another host computer on the Internet, it
specifies that application in each data transmission by using its port number.
Examples of applications with registered port numbers include
Sun's NEO Object Request Broker (port numbers 1047 and 1048) and Shockwave
(port number 1626). Besides the well-known port numbers and the registered port
numbers, the remaining ports in the port number spectrum are referred to as
dynamic ports or private ports and are numbered from 49152 through 65535.
Dynamic port numbers or Private port
numbers
The dynamic port numbers (also known as the private port numbers) are the port numbers that are
available for use by any application to use in communicating with any other
application, using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP). When one application communicates with another
application at another host computer on
the Internet, it specifies that application in each data transmission by using
its port number. The port numbers range from 0 through 65535. However, certain
port numbers - the well-known
port numbers and the registered
port numbers - are registered and administered by the Internet
Corporation for Assigned Names and Numbers (ICANN) for use by certain classes of applications. The dynamic port numbers
are in the highest range, from 49152
through 65535.
Wednesday, 26 March 2014
These are some pretty IMPORTANT things..That you MUST KNOW..
These are some pretty IMPORTANT things..That you MUST KNOW..
What they do ?
Who they are ?
The Internet Engineering Task Force (IETF) is a large open
international community of network designers, operators, vendors, and
researchers concerned with the evolution of the Internet architecture and the
smooth operation of the Internet. It is open to any interested individual. The
IETF Mission Statement is documented RFC3935.
Internet Corporation for Assigned
Names and Numbers –ICANN
To reach another person on the Internet you have to type an
address into your computer -- a name or a number. That address must be unique
so computers know where to find each other. ICANN
coordinates these unique identifiers across the world. Without that coordination,
we wouldn't have one global Internet.
In more
technical terms, the Internet Corporation for Assigned Names and Numbers (ICANN)
coordinates the Internet Assigned Numbers Authority (IANA)
functions, which are key technical services critical to the continued
operations of the Internet's underlying address book, the Domain Name System (DNS).
The IANA functions
include: (1) the coordination of the assignment of technical protocol
parameters including the management of the address and routing parameter area (ARPA)
top-level domain; (2) the administration of certain responsibilities associated
with Internet DNS root zone management
such as generic (gTLD) and
country code (ccTLD)
Top-Level Domains; (3) the allocation of Internet numbering resources; and (4)
other services. ICANN
performs the IANA
functions under a U.S. Government contract.Internet Assigned Numbers Authority-IANA
The Internet Assigned Numbers Authority (IANA) is a department of ICANN responsible for coordinating some of the key elements that keep the Internet running smoothly. Whilst the Internet is renowned for being a worldwide network free from central coordination, there is a technical need for some key parts of the Internet to be globally coordinated, and this coordination role is undertaken by IANA.
Specifically, IANA allocates and maintains unique codes and numbering systems that are used in the technical standards (“protocols”) that drive the Internet.
IANA’s various activities can be broadly grouped in to three categories:
Internet Architecture Board -IAB
The IAB is chartered both as a committee of the Internet Engineering Task Force (IETF) and as an advisory body of the Internet Society (ISOC). Its responsibilities include architectural oversight of IETF activities, Internet Standards Process oversight and appeal, and the appointment of the RFC Editor. The IAB is also responsible for the management of the IETF protocol parameter registries.
The Internet Research Task Force (IRTF)
promotes research of importance to the evolution of the Internet by creating
focused, long-term Research Groups working
on topics related to Internet protocols, applications, architecture and
technology.
Internet Society
The Internet Society engages in a wide spectrum of Internet
issues, including policy,
governance,
technology,
and development.
We establish and promote principles that are intended to persuade governments
to make decisions that are right for their citizens and each nation’s future.
Everything we do is based on ensuring that a healthy, sustainable Internet is
available to everyone – today and for the next billion users
Source :
Subscribe to:
Posts (Atom)