SlideShare una empresa de Scribd logo
1 de 7
Descargar para leer sin conexión
NETWORKING TOOL
TRACERT/TRACEROUTE
Introduction
Traceroute is a utility that send an ICMP packets from our computer to user input
destination and displays information about what is happening to the packet on each
point along the path. The path displayed is the list of near-side interface of the
routers between a source host and a destination. It also calculates and displays the
amount of time each hop took.
Hops are nothing but the computers, routers, or any devices that comes in between the source
and the destination.
Purpose of Traceroute
The purpose of traceroute is to identify the problematic server that is causing the
error, and that is why we send traceroute info only if there is an error before reaching
our servers. Traceroute is a very resource consuming operation and it will slow down
our servers a lot if we do it all the time. Network administrators and system
administrators use this tool most commonly in their day to day activities.
Types of Traceroute Program
There are different types of traceroute programs. Each of them works slightly
differently. But the overall concept behind each of them is the same. All of them use
the TTL value. The different types are mentioned below.
1) UDP Traceroute- It’s the default protocol used by Linux traceroute program.
However we can also use ICMP instead of UDP by giving the below
command in Linux.
root@workstation:~# traceroute -I -n 8.8.8.8
2) ICMP Traceroute- ICMP for traceroute works the same way as UDP
traceroute. Traceroute program will send ICMP Echo Request messages and
the hops in between will reply with a ICMP Time exceeded messages. But the
final destination will reply with ICMP Echo reply. Tracert command available in
windows operating system by default uses ICMP traceroute method.
3) TCP Traceroute- Its used because almost all firewall and routers in between
allows you to send TCP traffic. And if the packet is toward port 80, which is
the web traffic then most of the routers allow that packet. TCPTRACEROUTE
by default sends TCP SYN requests to port 80.
Objectives of Traceroute
● Traceroute determines how packets are being routed to a particular host.
● It also helps in determining the entire path that a packet travels through
● Determines names and identity of routers and devices in your path
● Helps in determining the Network Latency or more specifically the time taken to
send and receive data to each devices on the path
● It is useful in determining where a network outage is occurring, test connectivity
and determining congestion in traffic.
● Traceroute is a handy tool both for understanding where problems are in the
Internet network and for getting a detailed sense of the Internet itself.
● TRACERT is useful for troubleshooting large networks where several paths can
lead to the same point or where many intermediate components (routers or bridges)
are involved.
How Traceroute Works
When we connect to a website – say, google.com – the traffic has to go through
several intermediaries before reaching the website. The traffic goes through our local
router, our Internet service provider’s routers, onto larger networks, and so on.
Traceroute shows us the path traffic takes to reach the website. It also displays the
delays that occur at each stop. If we’re having issues reaching a website and that
website is working properly, it’s possible there’s a problem somewhere on the path
between our computer and the website’s servers. Traceroute would show us where
that problem is.
In more technical terms, Traceroute sends a sequence of packets using the ICMP
protocol. The first packet has a time-to-live (also known as TTL, or hop limit) of 1, the
second packet has a TTL of 2, and so on. Each time a packet is passed to a new
router, the TTL is decreased by 1. When it reaches 0, the packet is discarded and
the router returns an error message. By sending packets in this manner, traceroute
ensures that each router in the path will discard a packet and send a response.
Traceroute Command
The tracert command is CMD command that's used to show several details about
the path that a packet takes from the computer or device you're on to whatever
destination you specify.
It also sometimes referred as the traceroute command.
Tracert Command Syntax
The command for Unix systems is traceroute, whereas on Linux systems the
command is tracepath and current windows base systems used the command
tracert.
Syntax
tracert [-d] [-h MaxHops] [-w TimeOut] [-4] [-6] target [/?]
● -d = This option prevents tracert from resolving IP addresses to hostnames, often
resulting in much faster results.
● -h MaxHops = This tracert option specifies the maximum number of hops in the
search for the target.
● -w TimeOut = You can specify the time, in milliseconds, to allow each reply before
timeout using this tracert option.
● -4 = This option forces tracert to use IPv4 only.
● -6 = This option forces tracert to use IPv6 only.
● target = This is the destination, either an IP address or hostname.
● /? = Use the help switch with the tracert command to show detailed help about the
command's several options.
How to Use Traceroute
Suppose we want to do a traceroute to Google’s publicly available DNS server
(8.8.8.8). My traceroute command and its result will look something like the below.
tracert 8.8.8.8
When we fire that command of tracert 8.8.8.8, my computer makes a UDP packet.
This UDP packet will contain the following things.
1) My Source Address (Which is my IP address)
2) Destination address (Which is 8.8.8.8)
3) And a destination UDP port number which is invalid. Means the traceroute
utility will send packet to a UDP port in the range of 33434 to 33534, which is
normally unused.
Save the tracert output in a text file as follows:
1) Right-click the title bar of the Command Prompt window and choose Edit >
Select All.
2) Right-click the title bar of the Command Prompt window again and choose
Edit > Copy.
3) Open the Windows Notepad program: Windows Start icon > All Programs >
Accessories > Notepad.
4) To paste the output into Notepad, choose Edit > Paste.
5) Choose File > Save As and save the Notepad file to your desktop as
tracert1.txt.
Traceroute session may be stopped by pressing [Ctrl]+[C].
Note: - The tracert command is often used with other networking related Command
Prompt commands like ping, ipconfig, netstat, nslookup, and others.
Thank You
Traceroute- A Networking Tool

Más contenido relacionado

La actualidad más candente

Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)Respa Peter
 
Ip addressing
Ip addressingIp addressing
Ip addressingOnline
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Divya Tiwari
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocolssiva rama
 
TCP - Transmission Control Protocol
TCP - Transmission Control ProtocolTCP - Transmission Control Protocol
TCP - Transmission Control ProtocolPeter R. Egli
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11Keshav Maheshwari
 
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSDay 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSanilinvns
 
MikroTik & RouterOS
MikroTik & RouterOSMikroTik & RouterOS
MikroTik & RouterOSFaelix Ltd
 
MPLS Traffic Engineering
MPLS Traffic EngineeringMPLS Traffic Engineering
MPLS Traffic EngineeringAPNIC
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer ProtocolUjjayanta Bhaumik
 

La actualidad más candente (20)

IP Multicasting
IP MulticastingIP Multicasting
IP Multicasting
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
TCP - Transmission Control Protocol
TCP - Transmission Control ProtocolTCP - Transmission Control Protocol
TCP - Transmission Control Protocol
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
Ip and icmp
Ip and icmpIp and icmp
Ip and icmp
 
Ospf
OspfOspf
Ospf
 
C I D R
C I D RC I D R
C I D R
 
Wireshark
WiresharkWireshark
Wireshark
 
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSDay 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
 
5. icmp
5. icmp5. icmp
5. icmp
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
MikroTik & RouterOS
MikroTik & RouterOSMikroTik & RouterOS
MikroTik & RouterOS
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 
MPLS Traffic Engineering
MPLS Traffic EngineeringMPLS Traffic Engineering
MPLS Traffic Engineering
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 

Destacado

Ip Networking Over Satelite Course Sampler
Ip Networking Over Satelite Course SamplerIp Networking Over Satelite Course Sampler
Ip Networking Over Satelite Course SamplerJim Jenkins
 
Windows command prompt a to z
Windows command prompt a to zWindows command prompt a to z
Windows command prompt a to zSubuh Kurniawan
 
Secure Shell(ssh)
Secure Shell(ssh)Secure Shell(ssh)
Secure Shell(ssh)Pina Parmar
 
Ericsson commond list, BSS+NSS=OSS
Ericsson commond list, BSS+NSS=OSSEricsson commond list, BSS+NSS=OSS
Ericsson commond list, BSS+NSS=OSSMd Shameem
 
Ericsson BTS commisioning
Ericsson BTS commisioningEricsson BTS commisioning
Ericsson BTS commisioningShahid Rasool
 

Destacado (9)

Putty
PuttyPutty
Putty
 
Ip Networking Over Satelite Course Sampler
Ip Networking Over Satelite Course SamplerIp Networking Over Satelite Course Sampler
Ip Networking Over Satelite Course Sampler
 
Windows command prompt a to z
Windows command prompt a to zWindows command prompt a to z
Windows command prompt a to z
 
Secure SHell
Secure SHellSecure SHell
Secure SHell
 
Secure Shell(ssh)
Secure Shell(ssh)Secure Shell(ssh)
Secure Shell(ssh)
 
3 g basics
3 g basics3 g basics
3 g basics
 
SSH - Secure Shell
SSH - Secure ShellSSH - Secure Shell
SSH - Secure Shell
 
Ericsson commond list, BSS+NSS=OSS
Ericsson commond list, BSS+NSS=OSSEricsson commond list, BSS+NSS=OSS
Ericsson commond list, BSS+NSS=OSS
 
Ericsson BTS commisioning
Ericsson BTS commisioningEricsson BTS commisioning
Ericsson BTS commisioning
 

Similar a Traceroute- A Networking Tool

Commands used in Assessing Network layout & Security
Commands used in Assessing Network layout & SecurityCommands used in Assessing Network layout & Security
Commands used in Assessing Network layout & SecurityLearningwithRayYT
 
Command.pptx presentation
Command.pptx presentationCommand.pptx presentation
Command.pptx presentationAkshay193557
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Finalmasoodnt10
 
Aceleracion TCP Mikrotik.pdf
Aceleracion TCP Mikrotik.pdfAceleracion TCP Mikrotik.pdf
Aceleracion TCP Mikrotik.pdfWifiCren
 
How Does The Internet Work? : Notes
How Does The Internet Work? : NotesHow Does The Internet Work? : Notes
How Does The Internet Work? : NotesSubhajit Sahu
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...YonasBayu1
 
Ch 19 Network-layer protocols - section 2
Ch 19   Network-layer protocols - section 2Ch 19   Network-layer protocols - section 2
Ch 19 Network-layer protocols - section 2Hossam El-Deen Osama
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.pptssuserf7cd2b
 
CCNA Interview.pdf
CCNA Interview.pdfCCNA Interview.pdf
CCNA Interview.pdfhoang971
 
Network protocols
Network protocolsNetwork protocols
Network protocolsAbiud Orina
 
SOFTWARE TOOLS(Bhavik).pptx
SOFTWARE TOOLS(Bhavik).pptxSOFTWARE TOOLS(Bhavik).pptx
SOFTWARE TOOLS(Bhavik).pptxKaran216380
 
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxWireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxalanfhall8953
 
CREST CCT Exam Prep Notes
CREST CCT Exam Prep NotesCREST CCT Exam Prep Notes
CREST CCT Exam Prep NotesNathanAn
 
Pears
PearsPears
Pearsthips
 
Tcp presentation
Tcp presentationTcp presentation
Tcp presentationNoor Khalid
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET Journal
 

Similar a Traceroute- A Networking Tool (20)

Troubleshooting basic networks
Troubleshooting basic networksTroubleshooting basic networks
Troubleshooting basic networks
 
ICMPV4
ICMPV4ICMPV4
ICMPV4
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
 
Commands used in Assessing Network layout & Security
Commands used in Assessing Network layout & SecurityCommands used in Assessing Network layout & Security
Commands used in Assessing Network layout & Security
 
Command.pptx presentation
Command.pptx presentationCommand.pptx presentation
Command.pptx presentation
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
 
Aceleracion TCP Mikrotik.pdf
Aceleracion TCP Mikrotik.pdfAceleracion TCP Mikrotik.pdf
Aceleracion TCP Mikrotik.pdf
 
How Does The Internet Work? : Notes
How Does The Internet Work? : NotesHow Does The Internet Work? : Notes
How Does The Internet Work? : Notes
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...
 
Ch 19 Network-layer protocols - section 2
Ch 19   Network-layer protocols - section 2Ch 19   Network-layer protocols - section 2
Ch 19 Network-layer protocols - section 2
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
CCNA Interview.pdf
CCNA Interview.pdfCCNA Interview.pdf
CCNA Interview.pdf
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
SOFTWARE TOOLS(Bhavik).pptx
SOFTWARE TOOLS(Bhavik).pptxSOFTWARE TOOLS(Bhavik).pptx
SOFTWARE TOOLS(Bhavik).pptx
 
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxWireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
 
CREST CCT Exam Prep Notes
CREST CCT Exam Prep NotesCREST CCT Exam Prep Notes
CREST CCT Exam Prep Notes
 
Pears
PearsPears
Pears
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Tcp presentation
Tcp presentationTcp presentation
Tcp presentation
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
 

Último

Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosVictor Morales
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.elesangwon
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Industrial Applications of Centrifugal Compressors
Industrial Applications of Centrifugal CompressorsIndustrial Applications of Centrifugal Compressors
Industrial Applications of Centrifugal CompressorsAlirezaBagherian3
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书rnrncn29
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfisabel213075
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfalene1
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfManish Kumar
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptJohnWilliam111370
 

Último (20)

Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitos
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Industrial Applications of Centrifugal Compressors
Industrial Applications of Centrifugal CompressorsIndustrial Applications of Centrifugal Compressors
Industrial Applications of Centrifugal Compressors
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
 

Traceroute- A Networking Tool

  • 1. NETWORKING TOOL TRACERT/TRACEROUTE Introduction Traceroute is a utility that send an ICMP packets from our computer to user input destination and displays information about what is happening to the packet on each point along the path. The path displayed is the list of near-side interface of the routers between a source host and a destination. It also calculates and displays the amount of time each hop took. Hops are nothing but the computers, routers, or any devices that comes in between the source and the destination.
  • 2. Purpose of Traceroute The purpose of traceroute is to identify the problematic server that is causing the error, and that is why we send traceroute info only if there is an error before reaching our servers. Traceroute is a very resource consuming operation and it will slow down our servers a lot if we do it all the time. Network administrators and system administrators use this tool most commonly in their day to day activities. Types of Traceroute Program There are different types of traceroute programs. Each of them works slightly differently. But the overall concept behind each of them is the same. All of them use the TTL value. The different types are mentioned below. 1) UDP Traceroute- It’s the default protocol used by Linux traceroute program. However we can also use ICMP instead of UDP by giving the below command in Linux. root@workstation:~# traceroute -I -n 8.8.8.8 2) ICMP Traceroute- ICMP for traceroute works the same way as UDP traceroute. Traceroute program will send ICMP Echo Request messages and the hops in between will reply with a ICMP Time exceeded messages. But the final destination will reply with ICMP Echo reply. Tracert command available in windows operating system by default uses ICMP traceroute method. 3) TCP Traceroute- Its used because almost all firewall and routers in between allows you to send TCP traffic. And if the packet is toward port 80, which is the web traffic then most of the routers allow that packet. TCPTRACEROUTE by default sends TCP SYN requests to port 80. Objectives of Traceroute ● Traceroute determines how packets are being routed to a particular host. ● It also helps in determining the entire path that a packet travels through ● Determines names and identity of routers and devices in your path ● Helps in determining the Network Latency or more specifically the time taken to send and receive data to each devices on the path ● It is useful in determining where a network outage is occurring, test connectivity and determining congestion in traffic.
  • 3. ● Traceroute is a handy tool both for understanding where problems are in the Internet network and for getting a detailed sense of the Internet itself. ● TRACERT is useful for troubleshooting large networks where several paths can lead to the same point or where many intermediate components (routers or bridges) are involved. How Traceroute Works When we connect to a website – say, google.com – the traffic has to go through several intermediaries before reaching the website. The traffic goes through our local router, our Internet service provider’s routers, onto larger networks, and so on. Traceroute shows us the path traffic takes to reach the website. It also displays the delays that occur at each stop. If we’re having issues reaching a website and that website is working properly, it’s possible there’s a problem somewhere on the path between our computer and the website’s servers. Traceroute would show us where that problem is.
  • 4. In more technical terms, Traceroute sends a sequence of packets using the ICMP protocol. The first packet has a time-to-live (also known as TTL, or hop limit) of 1, the second packet has a TTL of 2, and so on. Each time a packet is passed to a new router, the TTL is decreased by 1. When it reaches 0, the packet is discarded and the router returns an error message. By sending packets in this manner, traceroute ensures that each router in the path will discard a packet and send a response. Traceroute Command The tracert command is CMD command that's used to show several details about the path that a packet takes from the computer or device you're on to whatever destination you specify. It also sometimes referred as the traceroute command. Tracert Command Syntax The command for Unix systems is traceroute, whereas on Linux systems the command is tracepath and current windows base systems used the command tracert. Syntax tracert [-d] [-h MaxHops] [-w TimeOut] [-4] [-6] target [/?] ● -d = This option prevents tracert from resolving IP addresses to hostnames, often resulting in much faster results. ● -h MaxHops = This tracert option specifies the maximum number of hops in the search for the target. ● -w TimeOut = You can specify the time, in milliseconds, to allow each reply before timeout using this tracert option. ● -4 = This option forces tracert to use IPv4 only.
  • 5. ● -6 = This option forces tracert to use IPv6 only. ● target = This is the destination, either an IP address or hostname. ● /? = Use the help switch with the tracert command to show detailed help about the command's several options. How to Use Traceroute Suppose we want to do a traceroute to Google’s publicly available DNS server (8.8.8.8). My traceroute command and its result will look something like the below. tracert 8.8.8.8 When we fire that command of tracert 8.8.8.8, my computer makes a UDP packet. This UDP packet will contain the following things. 1) My Source Address (Which is my IP address) 2) Destination address (Which is 8.8.8.8) 3) And a destination UDP port number which is invalid. Means the traceroute utility will send packet to a UDP port in the range of 33434 to 33534, which is normally unused.
  • 6. Save the tracert output in a text file as follows: 1) Right-click the title bar of the Command Prompt window and choose Edit > Select All. 2) Right-click the title bar of the Command Prompt window again and choose Edit > Copy. 3) Open the Windows Notepad program: Windows Start icon > All Programs > Accessories > Notepad. 4) To paste the output into Notepad, choose Edit > Paste. 5) Choose File > Save As and save the Notepad file to your desktop as tracert1.txt. Traceroute session may be stopped by pressing [Ctrl]+[C]. Note: - The tracert command is often used with other networking related Command Prompt commands like ping, ipconfig, netstat, nslookup, and others. Thank You