paint-brush
Building Ping Command in Node.js: Practical Guide to Buffers, Sockets, and Bit Manipulationby@dlitsman
6,992 reads
6,992 reads

Building Ping Command in Node.js: Practical Guide to Buffers, Sockets, and Bit Manipulation

by Dmitrii LitsmanJune 19th, 2023
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Building ping command in Node.js for fun. Short practical guide to buffers, sockets, bit manipulation, performance measurement, and Wireshark.
featured image - Building Ping Command in Node.js: Practical Guide to Buffers, Sockets, and Bit Manipulation
Dmitrii Litsman HackerNoon profile picture


You’ve probably used the ping command multiple times to test the connection to the server. This is a widely available tool. Have you ever thought about how exactly it works and how to implement it yourself? I find exploring some unknown things helpful in understanding how the system works, and in this article, I'll try to explain how exactly it works and how to recreate it from scratch in Node.js.


This is not a deep dive by any means, but we will cover some basics on how to implement the binary protocol, manipulate bits, debug network requests, measure time precisely, and more. So let's dive in.


What is ping?

In case you have never used ping before, "ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network... Ping measures the round-trip time for messages sent from the originating host to a destination computer that are echoed back to the source." (c) wiki


Let's give it a try. Just open a terminal and execute ping 1.1.1.1. You should see something similar to this:


$ ping 1.1.1.1
PING 1.1.1.1 (1.1.1.1): 56 data bytes
64 bytes from 1.1.1.1: icmp_seq=0 ttl=59 time=8.322 ms
64 bytes from 1.1.1.1: icmp_seq=1 ttl=59 time=19.255 ms
64 bytes from 1.1.1.1: icmp_seq=2 ttl=59 time=7.433 ms
...



Behind the scenes, we send ICMP packets to 1.1.1.1 and await a response. At the same time, we measure the time it takes, TTL, and some statistics across all requests. There is a high chance that you never heard about ICMP packets before. This protocol is primarily used by network devices to share operational information. It differs from more common TCP and UDP protocols but works on the same IP stack. Sounds fun, let's dive into implementation details.


Let's take a look at the protocol description on wiki. We will focus on IPv4 for simplicity, but it works similarly for IPv6.


Full IPv4 datagram



A lot is going on here. However, most of the work will be done automatically for us by OS or socket library. Let's focus on the red parts that we will have to implement ourselves.



PING request



Now we need to figure out how to send those bits and bytes


Debugging network with Wireshark

Now, we have a good theory behind us to get started. However, to debug our program, it would be helpful to see the actual bits and bytes we send to some IPs. The easiest way to check ANY traffic your machine is using is to use Wireshark. It is free and open-source software that works on both Windows and macOS. Before we start, let's check if theory and practice align on how the protocol works.


Two easy steps:

  1. Start Wireshark and choose what to capture (in my case wifi that is connected to the Internet)

  2. Add filter ICMP in the top bar as it will produce a lot of noise



Now execute $ ping 1.1.1.1 command in the terminal. This is more or less what you will see:

Wireshark screen with ICMP ping requests and responses



You can see all requests and responses of the ping command. Even better, Wireshark is quite powerful and knows how to handle ICMP commands. So it will help you parse bits to more meaningful and easier-to-read structures. You can also clearly see the layered structure of network protocols (Ethernet -> IP -> ICMP).


This will be very helpful in validating our setup. You can also hover over Packet Bytes to highlight what they are responsible for. In this case, you can see the Type of request is equal to 8, which is exactly what we would expect from our protocol described above.

Let's code

Now we have all the building blocks; we can start coding. Unfortunately, Node.js has no native support for raw sockets to use ICMP protocol. However, the raw-socket npm package supports it using node-gyp to access system-level APIs.


So practically, we need to:


  1. create socket
  2. subscribe to messages
  3. send messages


import raw from "raw-socket";

const socket = raw.createSocket({ protocol: raw.Protocol.ICMP });

socket.on("message", function (buffer, source) {
  // TODO Decode
});

socket.on("error", (e) => {
  console.error("Socket Error: ", e);
  socket.close();
});

const pingBuffer = createPingBuffer(1234, 0, "Payload");
socket.send(pingBuffer, 0, buffer.length, "1.1.1.1", function (error, bytes) {
  if (error) console.error("Unable to send message: ", error.toString());
});

function createPingBuffer(identifier, sequence, payload) {
  // TODO Encode
}



This is the main part of the app. Here we create an ICMP socket and start listening for new messages. At the same time, we send our ping command to the 1.1.1.1 IP address.

So now we need to implement encoding and decoding of the messages.


Encoding ping protocol

As you saw in the diagram above, we must provide 8 bytes of information: Type, Code, Checksum, Identifier, and Sequence Number. We can also provide an optional payload that will be returned to us in the response. This will be helpful later.


Minimal ping request



Type = 8 (Request) = 00001000 (binary)
Code = 0 = 00000000 (binary)
Checksum = dynamic value
Identifier = 1 = 0000000000000001 (binary)
Sequence Number = 0 = 0000000000000000 (binary)



For clarity, we show this information in multiple rows with a nice table. But just to be clear what we actually send is the following 64 bits:


0000100000000000111101111111111000000000000000010000000000000000



The easiest way to manipulate bits is to use Node.js Buffers. It is a subclass of JavaScript's Uint8Array and adds helpful methods to manipulate raw bytes.



const ICMP_HEADER_SIZE = 8;

function createPingBuffer(identifier, sequenceNumber, payload) {
  // Allocate empty 8 bytes buffer filled with 0
  const buffer = Buffer.alloc(ICMP_HEADER_SIZE);

  buffer.writeUInt8(8, 0); // Type 1 byte with offset 0 bytes
  buffer.writeUInt8(0, 1); // Code 1 byte with offset 1 byte
  buffer.writeUInt16BE(0, 2); // Checksum 2 bytes with offset 2 bytes
  buffer.writeUInt16BE(identifier, 4); // Identifier 2 bytes with offset 4 bytes
  buffer.writeUInt16BE(sequenceNumber, 6); // Sequence Number 2 bytes with offset 6 bytes

  // Override 0 checksum with correct value based on full request
  raw.writeChecksum(buffer, 2, raw.createChecksum(buffer));

  return buffer;
}



You might notice a weird BE suffix in the function name; it stands for Big-Endian. This is endianness. There are two ways how you can pack multi-byte values in the buffer. This defines which byte should be first/last.


That is it! We should be able to send ping requests now. Let's check if it works using Wireshark.



As you can see, it works as expected, and we were able to send a request. However, we still need to decode a response


Decode ping protocol

We can use similar helper methods on the Buffer class to decode the ping packet. However, there is a caveat. We will get a full IP protocol packet as a response. Yet, IP protocol has a dynamic header size. It means we will have to find where our ping message starts.


Let's take a closer look at the datagram


IHL stands for Internet Header Length. It has 4 bits that specify the number of 32-bit (4 bytes) words in the header. Unfortunately, Node.js Buffers lack helper methods to read 4-bit data. It means that we will have to implement it ourselves.


Here we will need to use bitwise operations. To get the last 4 bits of a byte, we will need to use bitwise AND


function getIPProtocolHeaderSize(buffer) {
  const versionAndIHL = buffer.readUInt8();
  const IHL = versionAndIHL & 0b00001111; // will remove everything in the first 4 bits -> 0x0000XXXX
  return IHL * 4; // multiply by 4 as it contains number of 32-bit (4 bytes) words to get total size in bytes
}


Now we have everything we need to decode a response:


function decodePingPacket(buffer) {
  const ipOffset = getIPProtocolHeaderSize(buffer);

  // IP level TTL
  const ttl = buffer.readUInt8(8);

  const type = buffer.readUInt8(ipOffset);
  const code = buffer.readUInt8(ipOffset + 1);
  const checksum = buffer.readUInt16BE(ipOffset + 2);
  const identifier = buffer.readUInt16BE(ipOffset + 4);
  const sequenceNumber = buffer.readUInt16BE(ipOffset + 6);

  return {
    ttl,
    type,
    code,
    checksum,
    identifier,
    sequenceNumber,
  };
}



That is it! We need to precisely measure the time between request and response to have a fully functional ping client.


Time measurement

If you pay closer attention to the original ping implementation, you will notice a special trick to make our client stateless and don't require us to track state for request/response time as ping protocol requires sending back the same payload we send as part of the request. We can send time as part of the payload! This is what the original UNIX implementation did.


Unix implementation of ping is open source, so we can learn some tricks from reading source code. Here, it adds timeval as part of the payload.


struct timeval {
  time_t      tv_sec;     /* seconds */
  suseconds_t tv_usec;    /* microseconds */
};


Let's use the same approach with our client. We will send a precise time when we send the command and compare it when we get a response. Standard Date.now() will not work well in this case as we deal with high-precision data. To get accurate time, we can use Performance API. So let's put it into practice and add it to the payload together with the payload itself.


const time = performance.timeOrigin + performance.now();

const uint32 = new Uint32Array(2);
uint32[0] = time / 1000; // seconds
uint32[1] = (time - uint32[0] * 1000) * 1000; // microseconds

// write it as first 8 bytes of payload
buffer.writeUInt32BE(uint32[0], 8);
buffer.writeUInt32BE(uint32[1], 12);

// write payload itself
buffer.write(payload, 16);

// compute checksum
raw.writeChecksum(buffer, 2, raw.createChecksum(buffer));

return buffer;


Conclusion

I intentionally simplified some things and cut some corners. Ideally, we will need to add error logging, keep track of statistics, etc. We also need to make sure to filter out all other ICMP packets that are not part of our ping request by checking the type of request and identifier.


However, I hope it was an interesting journey on how to implement low-level binary protocols, measure time, debug network requests, do bit manipulations, and read the source code. There is a lot to learn from other open-source projects.


I put together all the code here in this repo. It has some extra code to connect all the pieces together. Just run node index.js 1.1.1.1


$ node index.js 1.1.1.1
PING 1.1.1.1 (1.1.1.1): 28 data bytes
36 bytes from 1.1.1.1: icmp_seq=0 ttl=59 time=32.622314453125 ms
36 bytes from 1.1.1.1: icmp_seq=1 ttl=59 time=9.591552734375 ms
36 bytes from 1.1.1.1: icmp_seq=2 ttl=59 time=16.101806640625 ms
...