Filters








1,932 Hits in 3.5 sec

An ICMP-Based Mobility Management Approach Suitable for Protocol Deployment Limitation

Jeng-Yueng Chen, Chun-Chuan Yang, Wen-Shiung Chen, Yi-Hung Huang, Heng-Te Chu
2009 EURASIP Journal on Wireless Communications and Networking  
To address this problem and to offset the limitation of the original MRT approach, we propose two different schemes, an ICMP echo scheme and an ICMP destination-unreachable scheme.  ...  One step toward a solution is the Mobile Routing Table ( MRT), which enables edge routers to take over address binding.  ...  The backward tracking scheme uses the ICMP router discovery and SNMP query messages to find the routers that may support MRT.  ... 
doi:10.1155/2009/983594 fatcat:a2p4htfjjjcafdipfbyxquzpyu

ICMP, SNMP: Collaborative Approach to Network Discovery and Monitoring

Aman Mahajan, Haresh Joshi, Sahil Khajuria, Anil k. Verma
2012 International Journal of Smart Sensor and Adhoc Network.  
Based on the knowledge of the network topology discovery theory, the research on ICMP and SNMP programming for Windows, this paper proposes a method of developing the common network topology discovery  ...  software which is a conglomerate of ICMP and SNMP protocols so as to monitor a given network and successfully manage it while taking into full advantage of above mentioned protocols.  ...  When a router begins buffering too many packets, due to an inability to transmit them as fast as they are being received, it will generate ICMP Source Quench messages.  ... 
doi:10.47893/ijssan.2012.1065 fatcat:xja4ic3owbg65km7wm6qdg3due

Inferring and debugging path MTU discovery failures

Matthew Luckie, Kenjiro Cho, Bill Owens
2005 Proceedings of the 5th ACM SIGCOMM conference on Internet measurement - IMC '05  
If a host can send packets larger than an Internet path can forward, it relies on the timely delivery of Internet Control Message Protocol (ICMP) messages advising that the packet is too big to forward  ...  An ICMP Packet Too Big message reports the largest packet size -or Maximum Transmission Unit (MTU) -that can be forwarded to the next hop.  ...  Path MTU Discovery Failure Modes Router Configuration Issues The most well known PMTUD failure mode is the ICMP Black Hole discussed in RFC 2923 [4] .  ... 
doi:10.1145/1330107.1330129 fatcat:plmtjczcwjendodefovw2lnuay

An enhanced mobility management approach for wireless IP networks

Jeng-Yueng Chen, Wen-Shiung Chen, Chun-Chuan Yang, Yi-Hung Huang, Heng-Te Chu
2006 IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006.  
Nevertheless, we cannot demand all the edge routers to support MRT in the Internet.  ...  Instead, we developed a more efficient handoff scheme, called Mobile Routing Table ( MRT) to enable the edge routers to take over the address binding.  ...  Scheme 2: Router Discovery Instead of ICMP address mask query, this scheme uses the ICMP router discovery message to find the routers that may support MRT.  ... 
doi:10.1109/wcnc.2006.1683522 dblp:conf/wcnc/ChenCYHC06 fatcat:umdqwmkmtnfo5etjwqledfuigm

Security issues in control, management and routing protocols

Madalina Baltatu, Antonio Lioy, Fabio Maino, Daniele Mazzocchi
2000 Computer Networks  
This paper describes serious attacks against Internet control and management protocols, with an emphasis on the ICMP protocol, as well as some of the well-known vulnerabilities of the inter-domain routing  ...  Attacks using ICMP router discovery messages The ICMP router discovery messages are an ICMP extension to enable hosts attached to multicast or broadcast networks to discover the IP addresses of their neighboring  ...  The messages used by the ICMP Router Discovery Protocol (IRDP) are: · router advertisement: each router periodically multicasts router advertisement from each of its multicast interfaces, announcing the  ... 
doi:10.1016/s1389-1286(00)00159-6 fatcat:eeihbcvqjbcshatbfnavmhlnde

A Network Topology Discovery Tool for Android Smart Phones

Bilal Saeed, Tarek Sheltami, Elhadi Shakshuki
2015 Procedia Computer Science  
To speed up the topology discovery process, we used multi-threading; thus, multiple threads run in parallel and handle all the network discovery queries.  ...  In this paper, we present Topology Discovery Algorithm (TDA) to discover nodes and the topology of the network for the Android Platform.  ...  For the topology discovery, NetInventory system first enumerates all the IP addresses and sends ECHO or ICMP messages.  ... 
doi:10.1016/j.procs.2015.08.318 fatcat:5kj2zydm3bfabahtqo2lwylbnm

Device Discover: A Component For Network Management System Using Simple Network Management Protocol

Garima Gupta, Daya Gupta
2008 Zenodo  
An SNMP aware application is being developed that will manage the discovery procedure and will be used as data collector.  ...  Workstation Workstation Printer Printer Router Router Hub/Switch Hub/Switch 192.168.1.1/24 192.168.1.2/24 192.168.1.6/24 ICMP Echo ICMP Echo ICMP Echo ICMP Echo DeviceList: 192.168,1,1  ...  ICMP Scanner then creates ICMP echo message and send it to all the ip-addresses one by one.  ... 
doi:10.5281/zenodo.1332654 fatcat:grke4pn5zncjfo4nbnqe46bali

Network fingerprinting

Yves Vanaubel, Jean-Jacques Pansiot, Pascal Mérindol, Benoit Donnet
2013 Proceedings of the 2013 conference on Internet measurement conference - IMC '13  
In this paper, we describe a simple fingerprinting mechanism based on the initial TTL values used by routers to reply to various probing messages.  ...  Besides, it comes at a very low additional cost compared to standard active topology discovery measurements.  ...  an ICMP time-exceeded message.  ... 
doi:10.1145/2504730.2504761 dblp:conf/imc/VanaubelPMD13 fatcat:hiqwzdk34radpfal6ol6ppimiu

Detection of smurf flooding attacks using Kullback-Leibler-based scheme

Benamar Bouyeddou, Fouzi Harrou, Ying Sun, Benamar Kadri
2018 2018 4th International Conference on Computer and Technology Applications (ICCTA)  
Internet control message protocol (ICMP) flood attacks are still one of the most challenging threats in both IPv4 and IPv6 networks.  ...  This paper proposed an approach based on Kullback-Leibler divergence (KLD) to detect ICMP-based Denial Of service (DOS) and Distributed Denial Of Service (DDOS) flooding attacks.  ...  Most core functionalities, such as neighbor discovery and router discovery are associated with ICMPv6 [4] .  ... 
doi:10.1109/cata.2018.8398647 fatcat:olpzeu2zjnbc7gtt42mbith5he

Analyzing Router Responsiveness to Active Measurement Probes [chapter]

Mehmet H. Gunes, Kamil Sarac
2009 Lecture Notes in Computer Science  
In addition, ICMP based probes seem to elicit most responses and UDP based probes elicit the least.  ...  In this paper, we conduct an experimental study to understand the responsiveness of routers to active probing both from a historical perspective and current practices.  ...  to return ICMP Echo Reply messages.  ... 
doi:10.1007/978-3-642-00975-4_3 fatcat:fh2u27amojh5hha6232fmytify

Integrating Mobile OpenFlow Based Network Architecture with Legacy Infrastructure [chapter]

Martin Nagy, Ivan Kotuliak, Jan Skalny, Martin Kalcok, Tibor Hirjak
2015 Lecture Notes in Computer Science  
In this paper we introduce and explain features that allow fully SDN UnifyCore to be integrated with existing legacy network infrastructure (switches/routers).  ...  Both ARP APN discovery and ICMP topology discovery mechanisms might seem redundant, but it has to be noted, that pure OpenFlow forwarders do not support standard features of switches or routers such as  ...  Second phase is the topology discovery itself and starts when controller constructs ICMP echo request with encoded source forwarder ID (datapath ID) and source port ID in the payload of ICMP message and  ... 
doi:10.1007/978-3-319-24315-3_5 fatcat:eldww7db3fapvpnuowhv2bmvha

Hierarchical Home Agent Architecture for Mobile IP Communications

I. Romdhani, J. Munoz, H. Bettahar, A. Bouabdallah
2006 11th IEEE Symposium on Computers and Communications (ISCC'06)  
The HA on its home link that receives this request message replies with an ICMP Home Agent Address Discovery Reply message.  ...  As Figure 2 illustrates, our new field is added in the reserved field of the ICMP Home Agent Address Discovery Reply message.  ... 
doi:10.1109/iscc.2006.84 dblp:conf/iscc/RomdhaniMBB06 fatcat:kw42wtwbuzfcjjbzxrv75omcli

Revealing middlebox interference with tracebox

Gregory Detal, Benjamin Hesmans, Olivier Bonaventure, Yves Vanaubel, Benoit Donnet
2013 Proceedings of the 2013 conference on Internet measurement conference - IMC '13  
Further, as recent routers quote, in the ICMP message, the entire IP packet that they received, tracebox is able to detect any modification performed by upstream middleboxes.  ...  message.  ...  Unfortunately, some routers do not return such ICMP messages [21] and some middleboxes (e.g., NAT boxes and firewalls) do not correctly forward the received ICMP message to the correct source.  ... 
doi:10.1145/2504730.2504757 dblp:conf/imc/DetalHBVD13 fatcat:h335rfquwjalbhyu6invrd3gny

Defence mechanisms evaluation against RA flood attacks for Linux-victim node

Samad S. Kolahi, Bashar Barmada, Keysha Mudaliar
2017 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)  
This research evaluates the performance of different defence mechanisms used in IPv6 networks to protect against router advertisement (RA) flood attacks that rely in ICMPv6 Router Advertisement messages  ...  The defence mechanisms analysed here are: Access Control Lists, Disable Router Discovery, RA Guard, Validate Source MAC and VLAN.  ...  -turn off router discovery (the received RA message is not processed).  ... 
doi:10.1109/apsipa.2017.8282169 dblp:conf/apsipa/KolahiBM17 fatcat:2ukj6p3uuzep7ge3yonujaxhyi

Hidden Treasures - Recycling Large-Scale Internet Measurements to Study the Internet's Control Plane [article]

Jan Rüth, Torsten Zimmermann, Oliver Hohlfeld
2019 arXiv   pre-print
We receive ICMP messages from ~171M different IPs in roughly 53K different autonomous systems.  ...  We collect one week of ICMP responses (637.50M messages) to several Internet-wide ZMap scans covering multiple TCP and UDP ports as well as DNS-based scans covering > 50% of the domain name space.  ...  Redirect ICMP redirect messages (Type: 5), are sent by gateways/routers to signal routes to hosts.  ... 
arXiv:1901.07265v1 fatcat:yedgevhvbbc4rdeillz4iqq4ta
« Previous Showing results 1 — 15 out of 1,932 results