Вы находитесь на странице: 1из 3

Q1 Explain ping and tracert? Ans1.

Ping: It is a computer network administration utility and system administrator stoo lthat is used to see whether the computer in intact with network and also test t he reachability of a host on an IP network. It is also use to measure the RTT (r ound-trip-time) for messages sent from the source host to a destination computer . Pingoperates by sending Internet Control Message Protocol (ICMP) echo requestpac kets to the target host and waiting for protocol response. In the process it mea sures the time (RRT) from transmission to reception and records loss packets. Th e computer that sent the packet then waits for a return packet. If the connectio ns are found good, a good return packet will be received. If the packet bounces back when sent to the IP address but not when sent to the name, then the system is having a problem matching the name to the IP address. Tracert:Tracert (also known as traceroute) is a Windows based tool that allows y ou to help test your network infrastructure and also usedtracert to determine th e route packets take through a network to reach a particular host that you speci fy. When a packet passes through a host, the host decrements the TTL value by on e and forward the packet to the next host. When a packet with a TTL of one reach es a host, the host discards the packet and sends an ICMP time exceeded. Tracert , if used properly, can help you find points in your network that are either rou ted incorrectly or are not existent at all. Tracert is a Windows based command-l ine tool that you can use to trace the path that an Internet Protocol (IP) packe t takes to its destination from a source. Tracert will determine the path taken to a destination. For example, the path is from 10.1.2.4 and then to 10.1.2.1 (the LAN s default gate way), and then it will traverse the WAN to 10.1.1.1. The most important in the r esults of tracert this is because in this example, the T1 may be down and now the path is over the ISDN link. In the following example of the tracert command and its output, the packet trave ls through two routers (as seen in the last illustration) to get to host 10.1.1. 6. In this example, the default gateway from Site B is 10.1.2.1 Lets first see what it should look like using the T1. C:\>tracert 10.1.1.6 Tracing route to 10.1.1.6 over a maximum of 30 hops --------------------------------------------------1 2 ms 3 ms 2 ms 10.1.2.1 2 25 ms 83 ms 88 ms 192.168.11.1 3 25 ms 79 ms 93 ms 10.1.1.6 Trace complete. You can use tracert to find out where a packet stopped on the network as followi ng C:\>tracert 10.1.1.6 Tracing route to 22.110.0.1 over a maximum of 30 hops ----------------------------------------------------1 10.1.2.1 reports: Destination net unreachable.Trace complete. Q.2 Use ping to access ciit.edu.pk and mail.yahoo.com. Measure the RTT values at different times of day, and compare the results. What do you think accounts for the differen ces? The above shows that when I used ping www.ciit.edu.pkthen it showsIP 203.124.43 .105, sent packets is 4 and received is also 4 ,which show that connection is go od and loss of packet are 0%. Pinging command also shows the minimum RRT = 50ms maximum RRT = 57ms average RRT = 53ms

Similarly the pinging comand for www.mail.yahoo.com shows the IP of the server 8 7.248.120.148 and sent packets and received packets .Ping command show that the minimum RRT = 158ms maximum RTT = 163ms average RTT = 160ms So as at different times of the day the RRT values are changed because the acces s time to server is changed frquently. These both commands also show that server of the ciit.edu.pk is nearer than that of mail.yahoo.com which is clear from the RRT times of both Q.3 Use tracert to find the path from your computer to ciit.edu.pk and mail.yaho o.com. How well does the number of hops correlate with the RTT times from ping? How well the n umber of does hops correlate with geographical distance? Tracert command actually shows the number of nodes between the source and destin ation and the IP of that intermediate nodes. It also shows that the maximum hope s are 30 So the number of nodes between the host and www.ciit.edu.pk is 15 and their IP a re shown in tracertcommand . Similarly the nodes between host and www.mai.yahoo. com are 17 with the their IPs So if tracert command is checked for the given address the number of nodes are c hanging. Q.4 Suppose a 100-Mbps point-to-point link is being set up between Earth and a n ew lunar colony. The distance from the moon to Earth is approximately 385,000 km, and data tra vels over the link at the speed of light 3 108m/s. (a) Calculate the minimum RTT for the link. (b) Using the RTT as the delay, calculate the delay bandwidth product forthe l ink. (b) What is the significance of the delay bandwidth product computedin (b)? (c) A camera on the lunar base takes pictures of Earth and saves them in dig ital format to disk. Suppose Mission Control on Earth wishes to download the most current image, whic h is 25 MB. What is the minimum amount of time that will elapse between when the request for the data goes out andthe transfer is finished? Ans. a. Propagation delay on link=(385000 x 103 m)/ ( 3 x 108 m/s)=1.283 sec Thus the RRT is 1.283 x 2=2.56 b. Delay x product = 2. 56 s x 100 x 106 bps = 256 Mb c. The significance of the delay x product is that it gives the data to be transmite is double because the use of RRT as delay . d. Transmit delay = ( 25 x 106 x 8) / ( 100 x 106 bps) = 2 Total time= transmit delay + propagation delay= 2 + 1.28 = 3.28 secs Q.5 For each of the following operations on a remote file server, discuss whethe rthey are more likely to be delay sensitive or bandwidth sensitive. (a) Open a file. (b) Read the contents of a file. (c) List the contents of a directory. (d) Display the attributes of a file. Ans. a) Opening a file is delay-sensitive since the amount of data exchanged during t he open (e.g., the file name) is very small.

b) Reading the contents of a file can be either delay-sensitive or bandwidth-sen sitive, depending on how large the file is or small. (According to profiles of actual systems, most UNIX files are small as compared to others.) c) Listing the contents of a directory can be either delay-sensitive or bandwidt h-sensitive, depending on the size of the directory and access time to the directory. But the number of fi les and subdirectories contained within a directory is small, so the operation is delay sensitive. d) Displaying the attributes of a file is delay-sensitive.

Вам также может понравиться