Trace Utility to Trace IP Packet Path

Environment: C#

User Level: Advanced

Overview

This trace utility traces the path of an IP packet. To understand the process, its important to understand the ICMP protocol we are going to use for this purpose.

ICMP Protocol

The Internet Protocol (IP) is used for host-to-host datagram service in a system of interconnected networks. Occasionally, a destination host will communicate with a source host; for example, it is used to report an error in datagram processing. For such purposes, the Internet Control Message Protocol (ICMP) is used. ICMP uses the basic support of IP as if it were a higher-level protocol; however, ICMP is actually an integral part of IP, and must be implemented by every IP module.

ICMP messages are sent in several situations; for example,

  • When a datagram cannot reach its destination.
  • When the gateway does not have the buffering capacity to forward a datagram.
  • When the gateway can direct the host to send traffic on a shorter route.

The Internet Protocol is not designed to be absolutely reliable. The purpose of these control messages is to provide feedback about problems in the communication environment, not to make IP reliable. There are still no guarantees that a datagram will be delivered or a control message will be returned. Some datagrams may still be undelivered without any report of their loss. The higher-level protocols that use IP must implement their own reliability procedures if reliable communication is required.

The ICMP messages typically report errors in the processing of datagrams. To avoid the infinite regress of messages about messages and so forth, no ICMP messages are sent about ICMP messages. Also, ICMP messages are only sent about errors in handling fragment zero of fragemented datagrams. (Fragment zero has the fragment offeset equal zero.)

Basics of the Trace Utility

Apart from other fields, each ICMP header consists of a field called Time to Live (TTL). The TTL field is decremented at each machine in which the datagram is processed. Thus, if my packet routes through Machine A-> Machine B-> Machine C, and if I set the initial TTL to 3, TTL at B it would be 2 and at C it would be 1. If the gateway processing a datagram finds the TTL field is zero, it discards the datagram. The gateway also notifies the source host via the time exceeded message.

Thus, to get our utility working, we send a packet containing an echo request to the destination machine with an increasing TTL number, starting from 1. Each time the TTL goes to zero, the machine that was currently processing the datagram returns the packet with a time-exceeded message. We remeber the IP of this machine and send the packet back with an incremented TTL. We repeat this until we successfully receive an echo reply.

You can compile the .cs file on command line by using the command

csc Trace.cs

and running it.

Trace www.c-sharpcorner.com.

Questions? Send them to me at lparam@hotmail.com.

About the Author

Sanjay Ahuja is a Bachelor of Engineering and has done his CDAC from Pune, India. He is currently working as a consultant for Verizon.

Downloads

Download source and application -- 5 KB


Comments

  • Shows IP routing info, from RADB.

    Posted by priiyank_kansal1984 on 12/01/2005 06:24am

    how can i get IP Routing Information For a particular IP from RADB Using C#

    Reply
  • Recognize Limitations

    Posted by Legacy on 07/20/2002 12:00am

    Originally posted by: Keith Brigode

    This sort of trace is good in certain types of networks, but is dependant upon IP addressable devices. This may be true in very small or very old networks. Unfortunately most of the networks today have all sorts of virtual devices that will not respond. So this utility will give you some basic information regarding the entry and exit of some facility, but it will not tell you what is going on within. Many problems today exist in switches etc, none of which will respond.

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • The mobile market is white hot. Building a well-crafted product development plan that addresses market research, strategy, design, and development will provide the greatest chance for success. Each phase of an app's lifecycle is critical to the its overall success and feeds into the next step of the process of product development for the app. This white paper examines the five key phases of mobile app creation, one by one, to understand how they work together to help create a successful mobile app.

  • According to a 2014 Javelin Strategy & Research Study, there is a new victim of fraud every two seconds – and that's just in the U.S. With identity theft and consumer fraud rising, and more frequent and sizable data breaches in the news, financial institutions need to work harder than ever to protect their customers and their business. Download this white paper to learn how you can use multi-channel communications to minimize the costs of fraud while also increasing customer loyalty.

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date