Solved

communication over icmp...

Posted on 2002-06-14
3
225 Views
Last Modified: 2010-04-04
im looking for a code example on how to code a client/server application using the ICMP protocol, instead of TCP or UDP. Im developing a peer to peer file sharing application, and would like to use ICMP.. I don't care a lot about packet loss or anything, i would just like an example/pseudo code on how to send/receive ICMP packets. Thank you.
0
Comment
Question by:freedumb
3 Comments
 
LVL 12

Accepted Solution

by:
Lee_Nover earned 200 total points
ID: 7080137
you can checkout Indy 9 - TidICMPClient component
www.nevrona.com/indy - it's freware :)
0
 
LVL 1

Expert Comment

by:pnh73
ID: 9010899
No comment has been added lately, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question is:

Accept answer from Lee_Nover

Please leave any comments here within the next seven days.
 
PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!
 
Paul (pnh73)
EE Cleanup Volunteer
0

Featured Post

Networking for the Cloud Era

Join Microsoft and Riverbed for a discussion and demonstration of enhancements to SteelConnect:
-One-click orchestration and cloud connectivity in Azure environments
-Tight integration of SD-WAN and WAN optimization capabilities
-Scalability and resiliency equal to a data center

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This article explains how to create forms/units independent of other forms/units object names in a delphi project. Have you ever created a form for user input in a Delphi project and then had the need to have that same form in a other Delphi proj…
In my programming career I have only very rarely run into situations where operator overloading would be of any use in my work.  Normally those situations involved math with either overly large numbers (hundreds of thousands of digits or accuracy re…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

820 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question