Skip to main content

Traveling Through a Network

 Hi World, 

 

   Ping Command Activity – This was a great exercise that highlighted how ping commands work in a hands-on way. I enjoy being able to play around with topics we are learning about. Here are the screenshots of my ping results. The two other websites beyond google was the official Australian government response website: Australian.gov.au and the official website of the government of Japan: Japan.go.jp 

 

 

   I was rather shocked to see that the ping to Japan was the quickest when compared to google and the Australian website! The average speed for Japan was 24.025 ms (milliseconds). Google’s average speed was 24.474 ms and the Australian site’s average was 188.582 ms. Given how far away those countries were I expected them to take longer because there is so much more distance that needs to be traversed. Given that the Australian ping took the longest was expected, but the fact google sits in the middle is a surprise. 

 

   Traceroute Command activity – Much like the ping activity, the traceroute command activity was insightful. My experience with this was slightly different, in that one of the commands lasted for several minutes compared to the other two. The Australian’s site took the longest by far when compared to the google and Japan.go.jp site. The traceroute ended on its own after a few seconds for the google and Japan.go.jp websites. T

 

   The command went on for a total of 64 hops before it finally ended. 24-64 were all *** which means  they were not successful hops and the command timed out before a response was received. This activity was more aligned with what I was expecting, such as how the google traceroute was the shortest amount of hops with 13. The traceroute to the Japanese site took 18 hops which makes sense. The longest as noted above, was the Australian site with 64 hops. 

 

   As noted in our text, “a computer communicates via the internet by sending a packet, containing information like an address for a destination computer, the data size, and the data itself over communication links through several computers on a path to a destination,” (Vahid & Lysecky, 2019). Communication links can take the form of fiber optic cables or wireless satellites. 

 

   The Guide of Ping and Traceroute Commands defined these two utilities as troubleshooting methods for internet connectivity issues. Using these commands helps to provide a picture for how a packet travels through a given network. The ping command checks a device or website is available by sending small packets of information to a specific IP address and tracks how fast it takes to access it. Once the destination is reached the recipient computer sends back an echo reply to acknowledge that the information was received successfully. The traceroute command maps out the entire path of a small packet as it travels to its intended destination. In terms of reasons why either command might time out, one possibility is that a server runs into a firewall that blocks the command. Another possible reason is that the router rejects the command due to being disconnected or turned off. 

 

 

References:

 

University of Arizona Global Campus. (n.d.). Guide to ping and traceroute commands

 

Vahid, F., & Lysecky, S. (2019). Computing technology for all. zyBooks.

 

Comments

Popular posts from this blog

Tech Topic Connection

                 The tech topic I chose was the fascinating and growing world of mobile applications. The biggest reason behind this is because of the vast potential mobile applications, or apps, possess. The website emizentech.com reviewed a Statista report indicating “there are about 7.1 billion app users worldwide,” and that, “global revenue is expected to reach $808 billion in 2022,” (EmizenTech, 2022). This is a burgeoning industry that is only expected to grow in the coming years.     Apps translate, “communication efforts into interactive customer experiences heightening cognitive, emotional, emotional, and behavioral responses,” (Kim & Yu, 2016). The world is now more connected than ever before. Through certain apps, individuals have the capabilities of crossing geographical boundaries and allows us to communicate with anyone who also uses the app and has an internet connection.    I use my smartphone ever...

Network Security

    With the advent of computers and the internet, so too came the invention of harmful scams. These malicious entities have become more and more prevalent since the turn of the century and exist in various forms. From existing in different types of computer viruses, spam emails, phishing, and Denial of Service (DoS) attacks there are a multitude of ways for user’s personal information to be accessed and disseminated without knowledge or consent.               During week 3 of our course we learned about ping commands and even practiced using these to access different websites. This week’s venture into security took the concept even further by revealing how one can use ping commands in a negative and harmful way in the form of Denial of Service (DoS) attacks. These types of security breaches require no hacking of any kind, nor does it involve the installation of any type of malicious software which is also known ...