Jan 24, 2008CS573: Network Protocols and Standards1 The Internet Protocol: Related Protocols and Standards (Subnetting, ICMP) Network Protocols and Standards.

Slides:



Advertisements
Similar presentations
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Advertisements

TCP/IP TCP/IP architecture
Internet Control Protocols Savera Tanwir. Internet Control Protocols ICMP ARP RARP DHCP.
CSCI 4550/8556 Computer Networks Comer, Chapter 23: An Error Reporting Mechanism (ICMP)
Week 5: Internet Protocol Continue to discuss Ethernet and ARP –MTU –Ethernet and ARP packet format IP: Internet Protocol –Datagram format –IPv4 addressing.
Internet Control Message Protocol (ICMP)
1 Internet Networking Spring 2002 Tutorial 4 ICMP (Internet Control Message Protocol)
Oct 28, 2004CS573: Network Protocols and Standards1 IP: Routing and Subnetting Network Protocols and Standards Autumn
The Network Layer Chapter 5. The IP Protocol The IPv4 (Internet Protocol) header.
Internet Control Message Protocol (ICMP). Introduction The Internet Protocol (IP) is used for host-to-host datagram service in a system of interconnected.
Subnetting, ICMP, NAT, BOOTP
Chapter 5 The Network Layer.
Oct 26, 2004CS573: Network Protocols and Standards1 IP: Routing and Subnetting Network Protocols and Standards Autumn
Oct 21, 2004CS573: Network Protocols and Standards1 IP: Addressing, ARP, Routing Network Protocols and Standards Autumn
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
1 CCNA 2 v3.1 Module 8. 2 TCP/IP Suite Error and Control Messages CCNA 2 Module 8.
Internet Command Message Protocol (ICMP) CS-431 Dick Steflik.
1 K. Salah Module 5.3: Internet Control Message Protocol Why need ICMP? IP and ICMP ICMP Message Format ICMP Error Reporting messages ICMP Query messages.
1 Internet Control Message Protocol (ICMP) RIZWAN REHMAN CCS, DU.
1 ICMP : Internet Control Message Protocol Computer Network System Sirak Kaewjamnong.
1 CMPT 471 Networking II ICMP © Janice Regan, 2012.
TCP/IP Protocol Suite 1 Chapter 9 Upon completion you will be able to: Internet Control Message Protocol Be familiar with the ICMP message format Know.
TELE202 Lecture 10 Internet Protocols (2) 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Internet Protocols (1) »Source: chapter 15 ¥This Lecture »Internet.
Petrozavodsk State University, Alex Moschevikin, 2003NET TECHNOLOGIES Internet Control Message Protocol ICMP author -- J. Postel, September The purpose.
Guide to TCP/IP, Third Edition
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Network Layer ICMP and fragmentation.
Classless and Subnet Address Extensions (CIDR)
Internet Control Message Protocol (ICMP)
1 Version 3.1 modified by Brierley Module 8 TCP/IP Suite Error and Control Messages.
Page 19/13/2015 Chapter 8 Some conditions that must be met for host to host communication over an internetwork: a default gateway must be properly configured.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Internet Control Message Protocol (ICMP). Objective l IP and ICMP l Why need ICMP? l ICMP Message Format l ICMP fields l Examples: »Ping »Traceroute.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 8 TCP/IP Suite Error and Control Messages.
© 2002, Cisco Systems, Inc. All rights reserved..
© Jörg Liebeherr (modified by M. Veeraraghavan) 1 ICMP: A helper protocol to IP The Internet Control Message Protocol (ICMP) is the protocol used for error.
TCOM 515 IP Routing. Syllabus Objectives IP header IP addresses, classes and subnetting Routing tables Routing decisions Directly connected routes Static.
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
Internet Protocols. Address Resolution IP Addresses are not recognized by hardware. If we know the IP address of a host, how do we find out the hardware.
1 Network Layer Lecture 16 Imran Ahmed University of Management & Technology.
Error and Control An IP datagram travels from node to node on the way to its destination Each router operates autonomously Failures or problems may occur.
Chapter 23 Internet Control Message Protocol used to report information and errors IP uses ICMP when it sends an error message ICMP uses IP to transport.
Transport Layer3-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
1 Chapter 23 Internetworking Part 3 (Control Messages, Error Handling, ICMP)
Internet Protocols (chapter 18) CSE 3213 Fall 2011.
Cisco 2 - Routers Perrine. J Page 112/19/2015 Chapter 8 TCP/IP Error Message Some of the conditions that must be met in order for host to host communication.
ICMPv6 Error Message Types Informational Message Types.
CS470 Computer Networking Protocols
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 19 Omar Meqdadi Department of Computer Science and Software Engineering University.
IP Protocol CSE TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol.
CSE 421 Computer Networks. Network Layer 4-2 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 8 TCP/IP Suite Error and Control Messages.
Internet Control Message Protocol (ICMP)
Scaling the Network: Subnetting and Other Protocols
Internet Control Message Protocol (ICMP)
IP: Addressing, ARP, Routing
ICMP The IP provides unreliable and connectionless datagram delivery. The IP protocol has no error-reporting or error-correcting mechanism. The IP protocol.
Internet Control Message Protocol (ICMP)
21-2 ICMP(Internet control message protocol)
Chapter 9 ICMP.
Error and Control Messages in the Internet Protocol
Byungchul Park ICMP & ICMPv DPNM Lab. Byungchul Park
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Scaling the Network: Subnetting and Other Protocols
Internet Control Message Protocol
Fred Kuhns Applied Research Laboratory
Presentation transcript:

Jan 24, 2008CS573: Network Protocols and Standards1 The Internet Protocol: Related Protocols and Standards (Subnetting, ICMP) Network Protocols and Standards Winter

Jan 24, 2008CS573: Network Protocols and Standards2 IPv4 IP Datagram Format IPv4 Addressing ARP and RARP IP Routing Basics Subnetting and Supernetting ICMP Network Address Translation (NAT) Dynamic Addressing

Jan 24, 2008CS573: Network Protocols and Standards3 Issues in Addressing A large corporate/campus environment Large number of Local Area Networks Some with fewer than 256 hosts Some with more than 256 hosts If each physical network is assigned a network number: Immense administrative overhead to manage a large number of network addresses Routing tables in routers become extremely large (one entry for each physical network) Insufficient number of class B prefixes to cover medium sized networks (having more than 256 hosts)

Jan 24, 2008CS573: Network Protocols and Standards4 Subnetting Solution: Provide the campus with a single class B network Give freedom to the campus network admin to allocate host numbers to hosts From outside, the whole campus is simply known by the class B network ID Inside, there may be a hierarchy that remains transparent to the outside world

Jan 24, 2008CS573: Network Protocols and Standards5 Subnetting Consider a class B network How to allocate host numbers to hosts? A single LAN is out of question If host numbers are assigned randomly, i.e., without any hierarchy, the routers inside the network will have to deal with large tables – one entry per host Thus, a hierarchical structure is required

Jan 24, 2008CS573: Network Protocols and Standards6 Subnetting Physical Network (Subnet 1) Physical Network (Subnet 2) Physical Network (Subnet 3) Physical Network (Subnet 4) R R R R R H H H H H HH H H H H H

Jan 24, 2008CS573: Network Protocols and Standards7 Subnetting R Internet H1H2 H4H3 Network Network H1 wants to send an IP datagram to H3: Old addressing dictates it is a “direct delivery” With subnetting, it may become “indirect” R is not a Proxy ARP router! Subnet 1 Subnet 2

Jan 24, 2008CS573: Network Protocols and Standards8 Subnetting We previously divided IP addresses in a network portion and a host portion More generally, think of a 32-bit IP address as having an Internet part and a Local part Internet part of the IP address identifies a site (possibly with many physical networks) The local portion identifies a physical network and host at that site (note: physical network == extended LAN) Internet PartLocal Part Internet PartSubnetHost

Jan 24, 2008CS573: Network Protocols and Standards9 Subnetting Examples: Class B IP address Internet PartSubnetHost 16bits 8bits 8bits Internet PartSubnetHost 16bits3bits 13bits

Jan 24, 2008CS573: Network Protocols and Standards10 Subnet Implementation Subnet Mask: Specifies the bits of the IP address used to identify the subnet Internet Part of AddressSubnetHost 16bits 8bits 8bits Internet Part of AddressSubnetHost Subnet Mask (32bits) 16bits3bits 13bits

Jan 24, 2008CS573: Network Protocols and Standards11 Subnetting It is recommended that sites use contiguous subnet masks Avoid masks such as When choosing a subnet mask, balance: Size of networks Number of networks Expected growth Ease of maintenance It is possible to use different masks in different parts of the network

Jan 24, 2008CS573: Network Protocols and Standards12 Subnet Routing Conventional routing table entry (network address, next hop address) Network address format is predetermined for a given class (e.g., first 16 bits for class B addresses!) With subnetting, routing table entry becomes (subnet mask, network address, next hop address) Then compare with network address field of entries to find next hop address Subnet mask indicates the network address!

Jan 24, 2008CS573: Network Protocols and Standards13 Subnet Routing The use of mask generalizes the subnet routing algorithm to handle all the special cases of the standard algorithm Routes to individual hosts Default route Routes to directly connected networks Routes to conventional networks (that do not use subnet addressing) Merely combine the 32-bit mask field with the 32-bit IP address Example: To install a route for: Individual host (Mask of all 1’s, Host IP address) Default Route (Mask of all 0’s, network address all 0’s) Class B network address (Mask of two octets of 1’s and two of 0’s)

Jan 24, 2008CS573: Network Protocols and Standards14 Subnet Routing Algorithm Extract destination IP (D) from datagram Compute IP address of destination network N If N matches any directly connected network address Send datagram over that network (obviously encapsulated in a frame) Else For each entry in the routing table, do N* = bitwise-AND of D and subnet mask If N* equals the network address field of the entry, then route the datagram to the specified next hop

Jan 24, 2008CS573: Network Protocols and Standards15 Subnetting: Example Consider a corporate network assigned a class C address P.Q.R The company needs 5 subnets: 2 subnets of 16 hosts each 3 subnets with 32, 64, and 128 hosts External routers reach the corporate via single routing table entry P.Q.R.0 network and mask (if any) What about internal routers?

Jan 24, 2008CS573: Network Protocols and Standards16 Subnetting: Example S5 S4 S3 S2 S P.Q.R hhhh P.Q.R hhhh P.Q.R hhhh P.Q.R hhhh P.Q.R hhhh P.Q.R hhhh P.Q.R hhhh P.Q.R P.Q.R hhhh P.Q.R hhhh P.Q.R hhhh P.Q.R hhhh P.Q.R P.Q.R hhhh P.Q.R hhhh P.Q.R P.Q.R hhhh P.Q.R P.Q.R.0001 hhhh P.Q.R P.Q.R.0000 hhhh IP addressesNetwork/Subnet addressSubnet MaskSubnet Name { {

Jan 24, 2008CS573: Network Protocols and Standards17 Subnetting: Example S5 S4 S3 S2 S P.Q.R P.Q.R.1 hhhhhhh P.Q.R.01 hhhhhhP.Q.R P.Q.R P.Q.R.001 hhhhh P.Q.R P.Q.R.0001 hhhh P.Q.R P.Q.R.0000 hhhh IP addressesNetwork/Subnet addressSubnet MaskSubnet Name

Jan 24, 2008CS573: Network Protocols and Standards18 Subnetting: Routing Table P5 P4 P3 P2 P P.Q.R P.Q.R P.Q.R P.Q.R P.Q.R Network/Subnet addressSubnet MaskNext Hop/Port Routing table for a router INSIDE the company

Jan 24, 2008CS573: Network Protocols and Standards19 Subnetting: Routing Table P.Q.R / 28P1 P.Q.R / 28P2 P.Q.R / 27P3 P.Q.R / 26P4 P.Q.R / 25P5 Network/Subnet addressNext Hop/Port Number after / indicates number of bits to look at!

Jan 24, 2008CS573: Network Protocols and Standards20 Subnetting: Routing Table Subnet S4 has 64 hosts. Can we make two subnets? 16+48? P.Q.R hhhh P.Q.R hhhh P.Q.R hhhh P.Q.R P.Q.R hhhh Old maskOld subnetNew mask P.Q.R.01 hhhhhh P.Q.R.01 hhhhhh P.Q.R.01 hhhhhh P.Q.R hhhh { S P.Q.R.01 hhhhhhP.Q.R S P.Q.R.0100 hhhhP.Q.R S P.Q.R.01 hhhhhhP.Q.R

Jan 24, 2008CS573: Network Protocols and Standards21 Subnetting: Routing Table What if an IP in S42 is received? It will match on the second entry! What if an IP in S41 is received? It will match both entries! Which entry should be used? USE LONGEST PREFIX MATCH S P.Q.R.0100 hhhhP.Q.R S P.Q.R.01 hhhhhhP.Q.R

Jan 24, 2008CS573: Network Protocols and Standards22 Subnetting: Routing Table Where else longest prefix match can be used? P345 P2 P P.Q.R P.Q.R P.Q.R P.Q.R P.Q.R Network/Subnet addressSubnet MaskNext Hop/Port Aggregate P345 P2 P1 P.Q.R P.Q.R P.Q.R Network/Subnet addressSubnet MaskNext Hop/Port Router S1 S2 S5 S4 S3

Jan 24, 2008CS573: Network Protocols and Standards23 Supernet Addressing Use of many IP network addresses for a single organization Example: To conserve class B addresses, issue multiple class C address to the same organization Issue: increase in the number of entries in the routing table Solutions: Collapse a block of contiguous class C address into the pair: (network address, count) where network address is the smallest number in the block

Jan 24, 2008CS573: Network Protocols and Standards24 Supernet Addressing It requires each block to be a power of 2 and uses bit mask to identify the size of the block Example (8 contiguous class C blocks) Dotted decimal 32-bit binary equivalent Lowest IP: Highest IP: A block of 2048 addresses 32-bit mask is Do we really need address classes when we have masks? Answer: NO  CIDR (Classless Inter Domain Routing)

Jan 24, 2008CS573: Network Protocols and Standards25 Supernet Addressing In the router, the entry consists of: The lowest address and the 32-bit mask A block of addresses can be subdivided, and separate route can be entered for each subdivision When looking up a route, the routing software uses a longest-match paradigm to select a route

Jan 24, 2008CS573: Network Protocols and Standards26 IPv4 IP Datagram Format IPv4 Addressing ARP and RARP IP Routing Basics Subnetting and Supernetting ICMP Network Address Translation (NAT) Dynamic Addressing

Jan 24, 2008CS573: Network Protocols and Standards27 ICMP Motivation Questions in Routing: What if a router cannot route or deliver a datagram? What if a router experiences congestion? What if the TTL expires? Router needs to inform the source to take action to avoid or correct the problem ICMP – error reporting mechanism Can only report condition back to the original source Routers and hosts send error or control messages to others Specified in RFC 792

Jan 24, 2008CS573: Network Protocols and Standards28 ICMP ICMP messages are encapsulated in IP datagrams, with protocol type 1 In the data portion of the datagram, first byte indicates the ICMP message type and the format for the rest of the message Some ICMP packets have a code that further qualifies the type Most ICMP messages include the full IP header plus the first 8 bytes of the data portion of the datagram they refer to Helps sender identify the packet To avoid explosion of ICMP messages No ICMP packets are generated to report errors on ICMP packets If an ICMP message is generated about a fragmented datagram, it is generated only for the first fragment (fragment 0)

Jan 24, 2008CS573: Network Protocols and Standards29 Some ICMP Message Types Type FieldICMP Message Type 0Echo Reply 3Destination Unreachable 4Source Quench 5Redirect (change a route) 8Echo Request 9Router Advertisement 10Router Solicitation 11Time Exceeded for a Datagram 12Parameter Problem on a Datagram 13Timestamp Request 14Timestamp Reply 17Address Mask Request 18Address Mask Reply Reference: RFC 1700

Jan 24, 2008CS573: Network Protocols and Standards30 Echo Request/Reply Testing destination reachability and status Echo Request Message Echo Reply Message Command used to send ICMP echo request is, in most systems, called “ping” Echo request may contain some data, which is returned unchanged in the reply The ICMP Echo Request/Reply header also contains a sequence number and identifier, to aid the host in matching the request with the reply

Jan 24, 2008CS573: Network Protocols and Standards31 Echo Request/Reply ICMP Echo Request or Reply Message Format TYPE(0/8)CODE(0) IDENTIFIER CHECKSUM SEQUENCE NUMBER OPTIONAL DATA … … …

Jan 24, 2008CS573: Network Protocols and Standards32 Destination Unreachable Reports of unreachable destinations When a router can not forward or deliver an IP datagram, it sends a “destination unreachable” message back to the original source Code determines specific condition (see table)

Jan 24, 2008CS573: Network Protocols and Standards33 Destination Unreachable ICMP Destination Unreachable Message Format TYPE(3)CODE(0-12)CHECKSUM UNUSED (MUST BE ZERO) INTERNET HEADER+FIRST 8 BYTES OF DATA … … …

Jan 24, 2008CS573: Network Protocols and Standards34 Destination Unreachable Codes Code ValueMeaning 0Network Unreachable 1Host Unreachable 2Protocol Unreachable 3Port Unreachable 4Fragmentation Needed and DF Set 5Source Route Failed 6Destination Network Unknown 7Destination Host Unknown 8Source Host Isolated 9Communication with Destination Network Administratively Prohibited 10Communication with Destination Host Administratively Prohibited 11Network Unreachable for Type of Service 12Host Unreachable for Type of Service

Jan 24, 2008CS573: Network Protocols and Standards35 ICMP Source Quench Congestion and datagram flow control Report congestion to the original source Request to source to reduce current rate Usually sent for each datagram discarded Can be sent by a host or a router Some routers may be more sophisticated Monitor incoming traffic Quench sources that have the highest rates Avoid congestion by quenching before datagrams are lost

Jan 24, 2008CS573: Network Protocols and Standards36 Source Quench ICMP Source Quench Message Format TYPE(4)CODE(0)CHECKSUM UNUSED (MUST BE ZERO) INTERNET HEADER+FIRST 8 BYTES OF DATA … … …

Jan 24, 2008CS573: Network Protocols and Standards37 ICMP Redirect Message Host sends a datagram to router R1 to be forwarded to a certain destination Router R1 looks at its routing table, and finds the next router in the path as R2 If R2 is directly accessible to the sending host, R1 generates an ICMP Redirect Message back to the sender. R1 also forwards the datagram to R2 normally The purpose is to inform the host that there is a better route to that destination

Jan 24, 2008CS573: Network Protocols and Standards38 ICMP Redirect Message TYPE(5)CODE(0-3)CHECKSUM SUGGESTED ROUTER INTERNET ADDRESS INTERNET HEADER+FIRST 8 BYTES OF DATA … … … Code ValueMeaning 0Redirect datagrams for the Net (now obsolete) 1Redirect datagrams for the Host 2Redirect datagrams for the Type of Service and Net 3Redirect datagrams for the Type of Service and Host

Jan 24, 2008CS573: Network Protocols and Standards39 ICMP Time Exceeded TYPE(11)CODE(0/1)CHECKSUM UNUSED (MUST BE ZERO) INTERNET HEADER+FIRST 8 BYTES OF DATA … … … Code ValueMeaning 0Time-to-live count Exceeded 1Fragment reassembly time exceeded A router sends this message whenever a datagram is discarded because the TTL field in the datagram has reached zero or because its reassembly timer Expired while waiting for fragments

Jan 24, 2008CS573: Network Protocols and Standards40 Address Mask Request/Reply Obtaining a subnet mask ICMP address mask request message ICMP address mask reply message Request Sent directly to the router (if known) Broadcast (if router unknown) Response is unicast if the request contains a valid IP address; otherwise, it is a broadcast Any host can respond (see RFC 950)

Jan 24, 2008CS573: Network Protocols and Standards41 Address Mask Request/Reply ICMP address mask request or reply message format. Usually, hosts broadcast a request without knowing which specific router will respond. TYPE(17/18)CODE(0) IDENTIFIER CHECKSUM SEQUENCE NUMBER ADDRESS MASK

Jan 24, 2008CS573: Network Protocols and Standards42 Router Advertisement/Solicitation Options for the host to learn the router address(es) Manually enter entries Not up to date and cumbersome Host listens to routing protocol messages Protocols and their messages differ Complexity is introduced at the host Use of ICMP messages as defined in RFC 1256 Routers periodically send an ICMP “router Advertisement” – either broadcast or multicast Hosts may solicit such advertisements with a Router Solicitation message

Jan 24, 2008CS573: Network Protocols and Standards43 Router Advertisement TYPE(9)CODE(0)CHECKSUM LIFETIME (SEC) ROUTER ADDRESS [1] NUM ADDRS ADDR ENTRY SZIE = 2 ROUTER ADDRESS [2] PREFERENCE LEVEL [2] PREFERENCE LEVEL [1] … … …

Jan 24, 2008CS573: Network Protocols and Standards44 Router Solicitation TYPE(10)CODE(0)CHECKSUM RESERVED – Default advertisement rate is once every 7-10 minutes – The router solicitation message causes the routers to send their advertisements earlier – Lifetime of advertisements is typically 30 minutes

Jan 24, 2008CS573: Network Protocols and Standards45 Application: Traceroute Goal: Find the path a packet takes between two hosts Originator host sends a series of packets, starting with TTL=1 and increasing the TTL for each packet The first router in the path will drop the TTL=1 packet and send back an ICMP Time Exceeded Host learns who is the first hop Second router in the path will drop the packet that originated with TTL=2 and send back an ICMP Time Exceeded Third router will do the same upon receiving packet that originated with TTL=3 By collecting the ICMP responses, the host can figure out the path taken by the packet. Will this work?

Jan 24, 2008CS573: Network Protocols and Standards46 Application: Traceroute Current method described above requires 2N messages for a N-hop path Will also give wrong results if path changes ICMP Traceroute (RFC 1393) can do it in N+1 messages Idea: Define a traceroute IP option Send an IP packet with this option set Every intermediate system handling this packet will send back an ICMP traceroute to the source

Jan 24, 2008CS573: Network Protocols and Standards47 Application: Traceroute Tracing route to nova.stanford.edu [ ] over a maximum of 30 hops: 1 <10 ms <10 ms <10 ms shahalami.lums.edu.pk [ ] ms 1890 ms 1860 ms ms 1875 ms 1938 ms ms 1672 ms 1578 ms ms 1672 ms 1953 ms ms 1641 ms 1594 ms p5-2.nycmny1-cr11.bbnplanet.net [ ] ms 1688 ms 1719 ms p3-0.nycmny1-nbr1.bbnplanet.net [ ] ms * 1687 ms so chcgil2-br2.bbnplanet.net [ ] ms 1718 ms 1625 ms so dnvtco1-br2.bbnplanet.net [ ] ms 1718 ms 2000 ms p15-0.snjpca1-br2.bbnplanet.net [ ] ms 1844 ms 1562 ms p2-0.paix-bi3.bbnplanet.net [ ] ms 1813 ms 1812 ms p2-0.paix-bi2.bbnplanet.net [ ] ms 1625 ms 1688 ms p6-0.paloalto-nbr1.bbnplanet.net [ ] ms 1734 ms 2016 ms p1-0.paloalto-cr1.bbnplanet.net [ ] ms 1813 ms 1687 ms p1-0-0.paloalto-cr13.bbnplanet.net [ ] ms 1985 ms 1937 ms sunet-gateway.stanford.edu [ ] 17 * * * Request timed out. 18 * * * Request timed out ms 2203 ms 2078 ms nova.Stanford.EDU [ ]

Jan 24, 2008CS573: Network Protocols and Standards48 Application: Traceroute traceroute to suraj.lums.edu.pk ( ): 1-30 hops, 38 byte packets 1 quad-rtr.Stanford.EDU ( ) 1.49 ms (ttl=64!) 1.25 ms (ttl=64!) 1.32 ms (ttl=64!) 2 default-gateway-2.Stanford.EDU ( ) 2.27 ms 1.98 ms 2.82 ms 3 sunet-gateway.Stanford.EDU ( ) 2.18 ms 1.18 ms 1.25 ms 4 g1.ba21.b sfo01.atlas.cogentco.com ( ) 3.27 ms 3.79 ms 3.04 ms 5 g1-1.core01.sfo01.atlas.cogentco.com ( ) 4.23 ms 3.40 ms 3.18 ms 6 p5-0.core03.sfo01.atlas.cogentco.com ( ) 3.44 ms 3.51 ms 5.33 ms 7 ds3.st-paix.ix.singtel.com ( ) 10.9 ms (ttl=248!) 10.2 ms (ttl=248!) 12.1 ms (ttl=248!) 8 p6-1.plapx-cr1.ix.singtel.com ( ) 12.9 ms 13.5 ms 13.6 ms 9 POS2-0.above-core1.ix.singtel.com ( ) 14.6 ms 14.0 ms 13.3 ms ( ) 63.7 ms 58.7 ms 57.6 ms ( ) 78.1 ms (ttl=244!) 80.7 ms (ttl=244!) 82.0 ms (ttl=244!) ( ) 79.9 ms 80.5 ms 78.3 ms ( ) 373 ms (ttl=241!) 323 ms (ttl=241!) 310 ms (ttl=241!) ( ) 326 ms (ttl=240!) 329 ms (ttl=240!) 328 ms (ttl=240!) ( ) 328 ms (ttl=239!) 326 ms (ttl=239!) 326 ms (ttl=239!) ( ) 2075 ms (ttl=238!) 2146 ms (ttl=238!) 2216 ms (ttl=238!) 17 suraj.lums.edu.pk ( ) 2395 ms (ttl=237!) 2294 ms (ttl=237!) 2209 ms (ttl=237!)