Skip to main content

Traveling Through a Network

 Hi World, 

 

   Ping Command Activity – This was a great exercise that highlighted how ping commands work in a hands-on way. I enjoy being able to play around with topics we are learning about. Here are the screenshots of my ping results. The two other websites beyond google was the official Australian government response website: Australian.gov.au and the official website of the government of Japan: Japan.go.jp 

 

 

   I was rather shocked to see that the ping to Japan was the quickest when compared to google and the Australian website! The average speed for Japan was 24.025 ms (milliseconds). Google’s average speed was 24.474 ms and the Australian site’s average was 188.582 ms. Given how far away those countries were I expected them to take longer because there is so much more distance that needs to be traversed. Given that the Australian ping took the longest was expected, but the fact google sits in the middle is a surprise. 

 

   Traceroute Command activity – Much like the ping activity, the traceroute command activity was insightful. My experience with this was slightly different, in that one of the commands lasted for several minutes compared to the other two. The Australian’s site took the longest by far when compared to the google and Japan.go.jp site. The traceroute ended on its own after a few seconds for the google and Japan.go.jp websites. T

 

   The command went on for a total of 64 hops before it finally ended. 24-64 were all *** which means  they were not successful hops and the command timed out before a response was received. This activity was more aligned with what I was expecting, such as how the google traceroute was the shortest amount of hops with 13. The traceroute to the Japanese site took 18 hops which makes sense. The longest as noted above, was the Australian site with 64 hops. 

 

   As noted in our text, “a computer communicates via the internet by sending a packet, containing information like an address for a destination computer, the data size, and the data itself over communication links through several computers on a path to a destination,” (Vahid & Lysecky, 2019). Communication links can take the form of fiber optic cables or wireless satellites. 

 

   The Guide of Ping and Traceroute Commands defined these two utilities as troubleshooting methods for internet connectivity issues. Using these commands helps to provide a picture for how a packet travels through a given network. The ping command checks a device or website is available by sending small packets of information to a specific IP address and tracks how fast it takes to access it. Once the destination is reached the recipient computer sends back an echo reply to acknowledge that the information was received successfully. The traceroute command maps out the entire path of a small packet as it travels to its intended destination. In terms of reasons why either command might time out, one possibility is that a server runs into a firewall that blocks the command. Another possible reason is that the router rejects the command due to being disconnected or turned off. 

 

 

References:

 

University of Arizona Global Campus. (n.d.). Guide to ping and traceroute commands

 

Vahid, F., & Lysecky, S. (2019). Computing technology for all. zyBooks.

 

Comments

Popular posts from this blog

Network Security

    With the advent of computers and the internet, so too came the invention of harmful scams. These malicious entities have become more and more prevalent since the turn of the century and exist in various forms. From existing in different types of computer viruses, spam emails, phishing, and Denial of Service (DoS) attacks there are a multitude of ways for user’s personal information to be accessed and disseminated without knowledge or consent.               During week 3 of our course we learned about ping commands and even practiced using these to access different websites. This week’s venture into security took the concept even further by revealing how one can use ping commands in a negative and harmful way in the form of Denial of Service (DoS) attacks. These types of security breaches require no hacking of any kind, nor does it involve the installation of any type of malicious software which is also known ...

Applying Algorithmic Design & Data Structure Techniques

   This week's resource article describes an algorithm as, "a procedure that you can write as a C function or program, or any other language. An algorithm states explicitly how the data will be manipulated." (Complexity Analysis, n.d.).    The length of time a program takes to complete a given task depends on its algorithm. The algorithm deals with how data is organized and how it is accessed. The biggest considerations for creating applications are time complexity and space complexity.     With time complexity, this refers to the number of operations needed and the time it takes it takes for them to run. This is typically measured in milliseconds. Operations are typically: 'compare', 'swap', 'fetch from memory' and 'send to memory'. While each operation takes only a small amount of time; the number of operations that are necessary grow exponentially. As the list of operations grows, so too does the time it takes for them to be enacted.    ...

CPT 307: Data Structures & Algorithms - Week 1!

 Hello World! I am back in the blogosphere after several months. The present course is called "Data Structures & Algorithms" and this week's focus is centered around installing Java and reviewing object-oriented design principles.  Thankfully the instructions embedded within the course made the installation of Java and IDE (integrated development environment) NetBeans seamless. The links provided to each website were straightforward (for the most part):  NetBeans (version 16):  https://netbeans.apache.org/download/index.html Java (version 19):  https://www.oracle.com/java/technologies/downloads/ The 4 major principles of Object-Oriented Programming:  1) Encapsulation - The hiding of data implementation by restricting access to accessors and mutators. The pieces that surround the data that forms the class. An Accessor is a method that is used to ask an object about itself (Lewallen, 2005). This is typically in the form of properties. Mutators are public...