Computer Network Lab

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 31

MGM’s Jawaharlal Nehru Engineering

College N-6, CIDCO, Aurangabad-431003.

Department of Information Technology


Practical Workbook
Academic Year:
2019-2020

Class: Second
Year IT Course
Code:20UIT409L
Course Title: Computer Network
Semester: IV
Faculty Name: Ansari Mohsin Hafeez

i
Practical Record
Name of Student: Yashraj Mahesh Mohrir

PRN:202001100639 Roll no:202001106039

Sr. Practical details Date of Date of Marks/ Sign


No. performance evaluation Grade
1 Study of network devices 10/02/2022
2 Study of network IP 17/02/2022
3 Connecting computers in LAN 24/02/2022
4 Study of basic network commands and basic 04/03/2022
configuration commands
5 Implementing and IP addressing scheme 11/03/2022
6 Static and dynamic Routing 25/03/2022
7 Demonstration of wireshark 01/04/2022
8 Interpreting ping and traceroute output 08/04/2022

This is to certify that Mr. Yashraj Mahesh Mohrir of Class SY-IT Roll
No.202001106039 has performed the workbook exercises mentioned above in the
premises of institution.

Date: CourseCoordinator HOD


Principal

ii
1. Study of network devices:

 Introduction:
Hardware devices that are used to connect computers,
printers, fax machines and other electronic devices to a
network are called network devices. These devices
transfer data in a fast, secure and correct way over same
or different networks. Network devices may be inter-
network or intra-network. Some devices are installed on
the device, like NIC card or RJ45 connector, whereas
some are part of the network, like router, switch, etc.
Network devices, or networking hardware, are physical
devices that are required for communication and
interaction between hardware on a computer network.

 Description:
1. Repeater:Functioning at Physical Layer.Arepeater is an
electronic device that receives a signal and retransmits it
at a higher level and/or higher power, or onto the other
side of an obstruction, so that the signal can cover longer
distances. Repeater have two ports ,so cannot be use to
connect for more than two devices

2. Hub: An Ethernet hub, active hub, network hub,


repeater hub, hub or concentrator is a device for
connecting multiple twisted pair or fiber optic Ethernet
devices together and making them act as a single network

iii
segment. Hubs work at the physical layer (layer 1) of the
OSI model. The device is a form of multiport repeater.
Repeater hubs also participate in collision detection,
forwarding a jam signal to all ports if it detects a collision.

3. Switch:Anetwork switch or switching hub is a computer


networking device that connects network segments.The
term commonly refers to a network bridge that processes
and routes data at the data link layer (layer 2) of the OSI
model. Switches that additionally process data at the
network layer (layer 3 and above) are often referred to as
Layer 3 switches or multilayer switches.

4. Bridge: A network bridge connects multiple network


segments at the data link layer (Layer 2) of the OSI model.
In Ethernet networks, the term bridge formally means a
device that behaves according to the IEEE 802.1D
standard. A bridge and switch are very much alike; a
switch being a bridge with numerous ports. Switch or
Layer 2 switch is often used interchangeably with
bridge .Bridges can analyze incoming data packets to
determine if the bridge is able to send the given packet to
another segment of the network.

5. Router: A router is an electronic device that


interconnects two or more computer networks, and
selectively interchanges packets of data between them.
Each data packet contains address information that a
router can use to determine if the source and destination
are on the same network, or if the data packet must be
transferred from one network to another. Where multiple
iv
routers are used in a large collection of interconnected
networks, the routers exchange information about target
system addresses, so that each router can build up a table
showing the preferred paths between any two systems on
the interconnected networks.

6. Gate Way: In a communications network, a network


node equipped for interfacing with another network that
uses different protocols. • A gateway may contain devices
such as protocol translators, impedance matching devices,
rate converters, fault isolators, or signal translators as
necessary to provide system interoperability. It also
requires the establishment of mutually acceptable
administrative procedures between both networks. • A
protocol translation/mapping gateway interconnects
networks with different network protocol technologies by
performing the required protocol conversions.

Demonstration:
Binary format like as (0s and 1s) bits form that is easily understandable by
machines, and packets which are group of these bits, they traverse over the
network. Entire mechanism through those series of packets transmits over the
network that is managed by the IP (Internet Protocol).
End devices such as (PC, laptop or phone) which generate the few sequences
of data into Bit form and then IP always ready to send these packets to further
processing. If, massive amount of information to be broadcasted then huge
amount of bit are required for sending along with packets format.

v
All IP (Internet Protocol) packets are transmitted along with their paths
across the network, then router has responsible for getting to packet routing
to destination point.

While sending and receiving all data packets, each device appends the IP
address with these packets; IP address means unique address like as your
postal house address. The main goal of IP address like as postal address, it
means it identifies the sender and receiver over the network.
So, router has the all information that which path is better to send packets
across network. This information is stores into routing table, but before
sending any packet, it takes the decision that route is OK for forwarding
them, and this processing is known as the “Routing Process“.
Router has own ports or other interfaces which are getting to make interface
along with other connected network devices. Interfaces help to make
communication with links that are used for packet forwarding. Links means
that cable, fiber or even wireless.
 When packet reaches on the interface, then router must be known that
which interface is needed to use for sending out the packet.
 Router monitors the Routing Table which has entries related to every
aware to Destination point.
 Every Routing Entry holds the destination address and address of
further device on path known Next HOP device.

vi
 Then, existing NEXT HOP address, router has capable to check the
outgoing interface and ready to sends the packets.

Conclusion:
With a solid knowledge of the types of network devices, you can
develop and build a secure network that is good for your company.
Nonetheless, you need to carefully monitor your network devices and
behaviour around them to ensure continued safety and reliability of
your network in order to identify hardware problems, problems with
configuration and attacks quickly.

2. Study of network IP:


 Introduction:
An IP network is a group of computers connected via their unique internet
protocol (IP) addresses. Your employees can use these computers to
securely send and receive information with each other. The network allows
one computer to use the internet to talk to another computer by gathering
information and sending it directly to the other. Each computer connected
to the network has its own IP address, which allows your employees to
send information directly to the person they want.

 Description:
There are three types of IP addresses used in a network:

 Host Address: This address is unique to that individual and allows

them to communicate one-to-one and with the network.

vii
 Network Address:This is the first IP address in the network. This

address gives the hosts, who provide special network-related

services, the ability to communicate with others.

 Broadcast Address: This type of address allows the host to

broadcast an announcement across the entire network.

 One main benefit of creating a private IP Network for your office is


security. Your private network connects only the computers within
your office and keeps viruses and hackers out. You also have the
advantage of only relying on your network to function. If something
goes wrong, you don’t need to wait for an internet company to come
fix it. Instead, you can remedy the situation in-house.
 Having an in-office network for communication can help your
business and employees work both efficiently and as a team. You
can easily communicate with them as a group or quickly send
information directly to the people you want. With an IP network as
part of your communications system, your employees can access the
information they need securely from their computers.

 Demonstration:
Classification of IP address As show in figure we teach how the ip
addresses are classified and when they are used.

Sub netting Why we Develop sub netting and How to calculate subnet mask and
how to identify subnet address.

vii
i
Super netting Why we develop super netting and How to calculate supernet mask
and how to identify supernet address.

 Conclusion:
In essence, IP addresses are the identifier that allows information
to be sent between devices on a network: they contain location
information and make devices accessible for communication.

3. Connecting computers in LAN:

 Introduction:
A LAN may be wired, wireless, or a combination of the two. A standard
wired LAN uses Ethernet to connect devices together. Wireless LANs are
typically created using a Wi-Fi signal. If a router supports both Ethernet and
Wi-Fi connections, it can be used to create a LAN with both wired and
wireless devices. A local area network (LAN) consists of a series of
computers linked together to form a network in a circumscribed location.
The computers in a LAN connect to each other via TCP/IP ethernet or Wi-
Fi. A LAN is normally exclusive to an organization.

 Description:
 Stands for "Local Area Network" and is pronounced "lan." A
LAN is a network of connected devices that exist within a
specific location. LANs may be found in homes, offices,
educational institutions, and other areas.
 A LAN may be wired, wireless, or a combination of the two. A
standard wired LAN uses Ethernet to connect devices
together. Wireless LANs are typically created using a Wi-
Fi signal. If a router supports both Ethernet and Wi-Fi

ix
connections, it can be used to create a LAN with both wired
and wireless devices.
 Most residential LANs use a single router to create the
network and manage all the connected devices. The router
acts as the central connection point and enables devices,
such as computers, tablets, and smartphones to communicate
with each other. Typically, the router is connected to
a cable or DSL modem, which provides Internet access to
connected devices.
 A computer may also be the central access point of a LAN. In
this setup, the computer acts as a server, providing connected
machines with access to files and programs located on the
server. It also includes LAN software used to manage the
network and connected devices. LAN servers are more
common in business and educational networks, since the
extra capabilities are not required by most home users. In a
server-based LAN, devices may connect directly to the server
or indirectly via a router or switch.

 Demonstration:
On the host computer, follow these steps to share the Internet connection:
1. Log on to the host computer as Administrator or as Owner.
2. Click Start, and then click Control Panel.
3. Click Network and Internet Connections.
4. Click Network Connections.
5. Right-click the connection that you use to connect to the Internet. For
example, if you connect to the Internet by using a modem, right-click the
connection that you want under Dial-up / other network available.
6. Click Properties.
7. Click the Advanced tab.

x
8. Under Internet Connection Sharing, select the Allow other network users
to connect through this computer's Internet connection check box. 9. If you
are sharing a dial-up Internet connection, select the Establish a dial-up
connection whenever a computer on my network attempts to access the
Internet check box if you want to permit your computer to automatically
connect to the Internet.
10. Click OK. You receive the following message: When Internet
Connection Sharing is enabled, your LAN adapter will be set to use IP
address 192.168.0. 1. Your computer may lose connectivity with other
computers on your network. If these other computers have static IP
addresses, it is a good idea to set them to obtain their IP addresses
automatically. Are you sure you want to enable Internet Connection
Sharing?
11. Click Yes. The connection to the Internet is shared to other computers
on the local area network (LAN). The network adapter that is connected to
the LAN is configured with a static IP address of 192.168.0. 1 and a subnet
mask of 255.255.255.0 On the client computer
To connect to the Internet by using the shared connection, you must
confirm the LAN adapter IP configuration, and then configure the client
computer. To confirm the LAN adapter IP configuration, follow these steps:
1. Log on to the client computer as Administrator or as Owner.
2. Click Start, and then click Control Panel.
3. Click Network and Internet Connections.
4. Click Network Connections.
5. Right-click Local Area Connection and then click Properties.
6. Click the General tab, click Internet Protocol (TCP/IP) in the connection
uses the following items list, and then click Properties.
7. In the Internet Protocol (TCP/IP) Properties dialog box, click Obtain an IP
address automatically (if it is not already selected), and then click OK.
Note: You can also assign a unique static IP address in the range of
192.168.0.2 to 254. For example, you can assign the following static IP
address, subnet mask, and default gateway:

xi
8. IP Address 192.168.31.202
9. Subnet mask 255.255.255.0
10. Default gateway 192.168.31.1
11. In the Local Area Connection Properties dialog box, click OK.
12. Quit Control Panel.

 Conclusion: Multiple LANs may be combined to create a


larger LAN. This type of network, which can be customized to include
specific devices from various networks, is called a virtual LAN
or VLAN.

xii
4.Study of basic network commands and
basic configuration commands:

 Introduction:
The operating system consists of various built-in, command-line networking
utilities that are used for network troubleshooting. We will see various
networking commands which are most essentials for every network
administrator.

 Description: All commands related to Network configuration


which includes how to switch to privilege mode and normal mode and
how to configure router interface and how to save this configuration to
flash memory or permanent memory. This commands includes •
Configuring the Router commands • General Commands to configure
network • Privileged Mode commands of a router • Router Processes
& Statistics • IP Commands • Other IP Commands e.g. show ip route
etc. ping: ping(8) sends an ICMP ECHO_REQUEST packet to the
specified host. If the host responds, you get an ICMP packet back.
Sound strange? Well, you can “ping” an IP address to see if a
machine is alive. If there is no response, you know something is
wrong.

 Demonstration:

xii
i
Traceroute: Tracert is a command which can show you the path a
packet of information takes from your computer to one you specify. It
will list all the routers it passes through until it reaches its destination,
or fails to and is discarded. In addition to this, it will tell you how long
each 'hop' from router to router takes.

xi
v
nslookup: Displays information from Domain Name System (DNS)
name servers. NOTE :If you write the command as above it shows as
default your pc's server name firstly.
pathping: A better version of tracert that gives you statics about
packet lost and latency.

xv
Getting Help In any command mode, you can get a list of available
commands by entering a question mark (?). Router>? To obtain a list
of commands that begin with a particular character sequence, type in
those haracters followed immediately by the question mark (?).
Router#co? configure connect copy To list keywords or arguments,
enter a question mark in place of a keyword or argument. Include a
space before the question mark. Router#configure ? memory
Configure from NV memory network Configure from a TFTP network
host terminal Configure from the terminal You can also abbreviate
commands and keywords by entering just enough characters to make
the command unique from other commands. For example, you can
abbreviate the show command to sh. Configuration Files Any time
you make changes to the router configuration, you must save the
changes to memory because if you do not they will be lost if there is a
system reload or power outage. There are two types of configuration
files: the running (current operating) configuration and the startup
configuration. Use the following privileged mode commands to work
with configuration files.

 Conclusion: Networking commands are used at the


command prompt to get network information like the IP address of the
system, MAC address, network route traversed by a packet and the
IP address of the server in which a website or URL is hosted.

xv
i
Experiment no. 5
Introduction - The IP header has 32 bits assigned for addressing a
desired device on the network. An IP address is a unique identifier used to
locate a device on the IP network. To make the system scalable, the
address structure is subdivided into the network ID and the host ID.

Description -  Subnet an address space based on the host requirements.


 Assign host addresses to devices.
 Configure devices with IP addressing.
 Verify the addressing configuration.

Demonstration - Step 1: Subnet an address space based on the host


requirements. a. You are given the private address space 192.168.1.0/24. Subnet
this address space based on the following requirements:  LAN-A needs enough
addresses for 50 hosts.  LAN-B needs enough addresses for 40 hosts.

Step 2: Assign host addresses to devices.


Step 3: Configure devices with IP addressing. Configure HostA and
HostB with IP addressing, including the subnet mask and default
gateway. a. Click HostA. On the Desktop tab, choose IP Configuration.
Enter the correct addressing for HostA according to your answers in
Step 1 and Step 2. b. Click HostB. On the Desktop tab, choose IP
Configuration. Enter the correct addressing for HostB according to your
answers in Step 1 and Step 2. c. Check results. On the Assessment Items
tab, your configurations for HostA and HostB should have green
checkmarks. If not, read the provided feedback for a hint on how to
correct the problem.

xv
ii
Step 4: Verify the addressing configuration. a. Test connectivity
between HostA, HostB, ISP Workstation, and ISP Server. You can use
the Add Simple PDU tool to create pings between the devices. You can
also click HostA or HostB, then the Desktop tab, and then Command
Prompt. Use the ping command to test connectivity to other devices.
To obtain the IP address of another device, place your mouse pointer
over the device. b. Check results. On the Connectivity Tests tab, the
status of each test should be successful.

Conclusion - Now that we've discussed some of the major


components of networks and TCP/IP, you have the necessary
background to examine the more critical issues of security in a
converged environment. Knowing how networks are built gives
you a better understanding of what physical or logical
vulnerabilities are introduced by choosing one particular network
design over another. Knowing how packets are formed gives you
a better understanding of how they can be crafted or modified to
achieve a specific purpose.

xv
iii
Experiment no 6 - Static and dynamic routing
Introduction - Static routing and dynamic routing are two methods used
to determine how to send a packet toward its destination.
Description -

What is static routing?


Network administrators use static routing, or nonadaptive routing, to define a
route when there is a single route or a preferred route for traffic to reach a
destination. Static routing uses small routing tables with only one entry for
each destination. It also requires less computation time than dynamic routing
because each route is preconfigured.

What is dynamic routing?


Dynamic routing, sometimes called adaptive routing, is more complex than
static routing because it creates more possible routes to send packets across
a network. Dynamic routes are typically used in larger, fluid networks where
static routes would be cumbersome to maintain and frequently reconfigure.
Because dynamic routing is more complicated, it consumes more bandwidth
than static routing.

Demonstration –

Step 1: Test Connectivity Using Static and Default Routing. Open a Command Prompt on PC0.
Trace (tracert) a connection to the Edge1 FastEthernet 0/0 address. This should be successful.

Step 2: Bring down Frame Relay Network and Observe Routing. On the BR2 router, shutdown
the link to the Frame Relay network.

Step 3: Configure Dynamic Routing and Observe Routing a. Configure EIGRP (AS 10) on the BR2
and ISP2 routers. Be sure to include all directly connected networks and turn off auto-summary.
b. Do a third trace from PC0 to the Edge1 FastEthernet 0/0 interfaces.

xi
x
conclusion –
Static routing provides some advantages over dynamic routing, including:

 Static routes are not advertised over the network, resulting in better security.
 Static routes use less bandwidth than dynamic routing protocols, as routers do not exchange
routes.
 No CPU cycles are used to calculate and communicate routes.
 The path a static route uses to send data is known.

xx
Experiment no 7 – Demonstration of Wire shark

Introduction - Wireshark is an open-source packet analyzer, which is used


for education, analysis, software development, communication protocol
development, and network troubleshooting.

It is used to track the packets so that each one is filtered to meet our specific needs. It is
commonly called as a sniffer, network protocol analyzer, and network analyzer. It is
also used by network security engineers to examine security problems.

Wireshark is a free to use application which is used to apprehend the data back and
forth. It is often called as a free packet sniffer computer application. It puts the network
card into an unselective mode, i.e., to accept all the packets which it receives.

Description –
Uses of Wireshark:

Wireshark can be used in the following ways:

1. It is used by network security engineers to examine security problems.


2. It allows the users to watch all the traffic being passed over the network.
3. It is used by network engineers to troubleshoot network issues.
4. It also helps to troubleshoot latency issues and malicious activities on your network.
5. It can also analyze dropped packets.
6. It helps us to know how all the devices like laptop, mobile phones, desktop, switch,
routers, etc., communicate in a local network or the rest of the world.

What is a packet?
A packet is a unit of data which is transmitted over a network between the origin and
the destination. Network packets are small, i.e., maximum 1.5 Kilobytes for Ethernet
packets and 64 Kilobytes for IP packets. The data packets in the Wireshark can be
viewed online and can be analyzed offline.

. There are around 600 contributed authors for the Wireshark product website.

xx
i
Functionality of Wireshark:
Wireshark is similar to tcpdump in networking. Tcpdump is a common packet analyzer
which allows the user to display other packets and TCP/IP packets, being transmitted
and received over a network attached to the computer. It has a graphic end and some
sorting and filtering functions. Wireshark users can see all the traffic passing through the
network.

Wireshark can also monitor the unicast traffic which is not sent to the network's MAC
address interface. But, the switch does not pass all the traffic to the port. Hence, the
promiscuous mode is not sufficient to see all the traffic. The various network taps
or port mirroring is used to extend capture at any point.

Features of Wireshark
o It is multi-platform software, i.e., it can run on Linux, Windows, OS X, FreeBSD, NetBSD,
etc.
o It is a standard three-pane packet browser.
o It performs deep inspection of the hundreds of protocols.
o It often involves live analysis, i.e., from the different types of the network like the
Ethernet, loopback, etc., we can read live data.
o It has sort and filter options which makes ease to the user to view the data.
o It is also useful in VoIP analysis.
o It can also capture raw USB traffic.
o Various settings, like timers and filters, can be used to filter the output.

Demonstration -

Installation of Wireshark Software


Below are the steps to install the Wireshark software on the computer:

o Open the web browser.


o Search for 'Download Wireshark.'

xx
ii
o Select the Windows installer according to your system configuration, either 32-bt or 64-
bit. Save the program and close the browser.
o Now, open the software, and follow the install instruction by accepting the license.
o The Wireshark is ready for use.

On the network and Internet settings option, we can check the interface connected to
our computer.

If you are Linux users, then you will find Wireshark in its package repositories.

By selecting the current interface, we can get the traffic traversing through that
interface. The version used here is 3.0.3. This ver

xx
iii
sion will open as:

The Wireshark software window is shown above, and all the processes on the network
are carried within this screen only.

The options given on the list are the Interface list options. The number of interface
options will be present. Selection of any option will determine all the traffic. For

xx
iv
example, from the above fig. select the Wi-Fi option. After this, a new window opens
up, which will show all the current traffic on the network. Below is the image which tells
us about the live capture of packets and our Wireshark will look like:

xx
v
Conclusion - Wireshark interactively examines and investigates data from http requests,
Cookies, Forms, Ethernet, Token-Ring, FDDI, live network, or a captured file. It can easily
decipher data and displays it as clear as possible. It does contain some powerful features like
TCP Stream which allows viewing reconstructed stream of TCP session and it also has the
capability to monitor UDP and SSL streams.

Experiment no 8 - Interpreting ping and traceroute


output
Introduction - Ping and traceroute are common commands you
can use to troubleshoot network problems.

Ping is a simple command that can test the reachability of a


device on the network.
xx
vi
Traceroute is a command you use to 'trace' the route that a
packet takes when traveling to its destination. It's useful for
tracing network problems, discovering where connections fail,
and tracking down latency problems.

Description - How does ping work?


Ping uses ICMP (Internet Control Message Protocol) Echo
messages to see if a remote host is active or inactive, how long
a round trip message takes to reach the target host and return,
and any packet loss.

It sends a request and waits for a reply (which it receives if the


destination responds back within the timeout period).

It's basically a quick, easy way to verify that you can reach a
destination on the internet. If you can, great! If not, you can use
traceroute to investigate what's happening at every step
between your device and the destination.

How does traceroute work?


By default, traceroute sends three packets of data to test each
'hop' (when a packet is passed between routers it is called a
'hop').

It will first send 3 packets to an unreachable port on the target


host, each with a Time-To-Live (TTL) value of 1. This means
that as soon as it hits the first router in the path (within your
network), it will timeout. The first router will respond with an
ICMP Time Exceeded Message (TEM), as the datagram has
expired.

xx
vii
Then another 3 datagrams are sent, with the TTL set to 2,
causing the second router (your ISP) in the path to respond with
an ICMP TEM.

This continues until the datagrams eventually have a TTL long


enough to reach the destination. When it does, as the
messages are being sent to an invalid port, an ICMP port
unreachable message is returned, signaling that the traceroute
is finished.

In this case, an error message is actually expected behavior,


not a sign that something has gone wrong.

The most important part of a traceroute is usually the round trip


times. Ideally you're looking for consistent times over the course
of the trace.

If you see times suddenly increase (elevated latency) on a


specific hop, and continue to increase as the trace approaches
the target, this may indicate a problem starting with the sudden
increase.

However, if there is elevated latency in the middle, but it


remains consistent toward the end, or if the elevated latency
decreases toward the end, that doesn't necessarily indicate a
problem.

If you see high latency at the beginning of the trace, it may


indicate a problem with your local network. You should work
with your local admin (or yourself, if you are your own local
admin) to fix it. By default, Windows uses ICMP to transmit the
data while Linux uses UDP.

Demonstration –
xx
vii
Step 1: Test connectivity using ping from a host computer and a router.
Click N-Host, click the Desktop tab, and then click Command Prompt.
From the Command Prompt window, ping the Cisco server at
www.cisco.com. Packet Tracer PC Command Line 1.0 PC>ping
www.cisco.com Pinging 64.100.1.185 with 32 bytes of data: Request
timed out.

Step 2: Test connectivity using traceroute from a host computer and a


router. a. Click N-Host, click the Desktop tab, and then click Command
Prompt. From the Command Prompt window, trace the route to the
Cisco server at www.cisco.com. PC>tracert www.cisco.com Tracing
route to 64.100.1.185 over a maximum of 30 hops: 1 92 ms 77 ms 86 ms
192.168.1.1 2 91 ms 164 ms 84 ms 64.100.1.101 3 135 ms 168 ms 151
ms 64.100.1.6 4 185 ms 261 ms 161 ms 64.100.1.34 5 257 ms 280 ms
224 ms 64.100.1.62 6 310 ms 375 ms 298 ms 64.100.1.185 Trace
complete. PC> The above output shows that you can successfully trace a
route all the way to the Cisco server at 64.100.1.185.

Step 3: Practice
the ping and trace route commands. Throughout
this course, you will often use ping and traceroute to test
connectivity and troubleshoot problems. To practice these
commands, ping and trace from W-Host and S-Host to any other
destination in the network. You can also ping and trace from N-
Branch to other locations.

Conclusion - Ping and Traceroute seem like cousins, as both of them can be
used to test the status of the destination server. However, Ping is an easier and
quicker method to check the destination server’s utility, as well as how long it
should take to receive and send data to the specific server. In contrast, the
traceroute searches for the “exact route” taken to connect with a server and the
hop (, i.e. time spent by each step) between points and the next.

xx
ix
xx
x
xx
xi

You might also like