Instructors Notes

advertisement
Network+ Guide to Networks, 6th Edition
Chapter 9
In-Depth TCP/IP Networking
At a Glance
Instructor’s Manual Table of Contents

Overview

Objectives

Teaching Tips

Quick Quizzes

Class Discussion Topics

Additional Projects

Additional Resources

Key Terms
9-1
Network+ Guide to Networks, 6th Edition
9-2
Lecture Notes
Overview
In Chapter 4, students learned about core protocols and subprotocols in the TCP/IP protocol
suite, addressing schemes, and host and domain naming. Students also learned that TCP/IP is a
complex and highly customizable protocol suite. This chapter builds on these basic concepts,
examining how TCP/IP-based networks are designed and analyzed. It also describes the
services and applications that TCP/IP-based networks commonly support.
Chapter Objectives
After reading this chapter and completing the exercises, the student will be able to:
 Describe methods of network design unique to TCP/IP networks, including subnetting,
CIDR, and address translation
 Explain the differences between public and private TCP/IP networks
 Describe protocols used between mail clients and mail servers, including SMTP, POP3,
and IMAP4
 Employ multiple TCP/IP utilities for network discovery and troubleshooting
Teaching Tips
Designing TCP/IP-Based Networks
1. Describe how most modern networks rely on the TCP/IP protocol suite.
2. Review TCP/IP fundamentals.
3. Note the two versions of IP.
a. Explain why this discussion on IP addressing focuses on IPv4.
4. Review these IPv4 address expressions:
a. Binary and dotted decimal
5. Remind students that many networks assign IP addresses and host names dynamically,
using DHCP, rather than statically.
6. Review network classes.
a. Emphasize that a node’s network class provides information about the segment
or network to which the node belongs.
Subnetting
1. Define the term subnetting.
Network+ Guide to Networks, 6th Edition
9-3
2. Discuss how networks are commonly subnetted.
a. Geographic locations
b. Departmental boundaries
c. Technology types
3. Discuss three reasons why a network administrator might separate traffic.
4. Review IPv4 addressing conventions on a network that does not use subnetting.
5. Introduce and explain classful addressing in IPv4.
6. Remind students that all IPv4 addresses consist of network and host information.
7. Explain where the network information portion of an IPv4 address (the network ID) is
located in classful addressing:
a. First 8 bits in a Class A address
b. First 16 bits in a Class B address
c. First 24 bits in a Class C address
8. Explain where the host information portion of an IPv4 address is located in classful
addressing:
a. Last 24 bits for a Class A address
b. Last 16 bits in a Class B address
c. Last 8 bits in a Class C address
9. Use Figure 9-1 to illustrate examples of IPv4 addresses separated into network and host
information according to the classful addressing convention.
10. Introduce and describe IPv4 subnet masks.
11. Use Table 9-1 to illustrate how each network class is associated with a default subnet
mask.
a. Remind students that an octet composed of all 1s in binary notation equals 255
in decimal notation and an octet composed of all 0s in binary notation equals 0
in decimal notation.
12. Define and explain the concept of ANDing.
a. Explain how to calculate a host’s network ID given its IPv4 address and subnet
mask.
b. Use Table 9-2 to illustrate ANDing.
c. Use Figure 9-3 to illustrate and example of calculating a host’s network ID.
Network+ Guide to Networks, 6th Edition
Teaching
Tip
9-4
Point out that several online sites and operating systems provide calculators that
calculate AND operations. Provide a class demonstration of the Windows
operating system calculator by navigating to the Accessories area containing the
calculator. Change the calculator view to scientific if necessary. Select “bin” for
input and practice ANDing two binary numbers of various numeric contents and
lengths.
13. Define and explain the concept of reserved addresses.
a. Describe why the network ID is considered a reserved address.
b. Describe why the broadcast address is considered a reserved address.
c. Explain why only the numbers 1 through 254 can be used for host information in
an IPv4 address.
14. Introduce and explain IPv4 subnetting techniques.
a. Note that subnetting breaks the rules of classful IPv4 addressing.
b. Describe how some bits in an IP address that represent host information in
classful addressing are changed to represent network information instead.
c. Emphasize the consequence of subnetting in terms of the number of useable host
addresses available per subnet.
d. Use Table 9-5 to illustrate the numbers of subnets and hosts that can be created
by subnetting a Class B network.
e. Use Table 9-5 to illustrate the numbers of subnets and hosts that can be created
by subnetting a Class C network.
15. Introduce the topic of calculating IPv4 subnets.
a. Present and explain the formula for determining how to modify a default subnet
mask.
b. Walk through an example that utilizes a leased Class C network with network
ID of 199.34.89.0 and then divides it into six subnets.
c. Use Table 9-6 to illustrate a listing of the network ID, broadcast address, and
usable host addresses for each of the six subnets in the example Class C
network.
d. Point out that the extended network prefix for each subnet is based on which of
the additional (borrowed) network information bits are set to equal 1.
e. Point out that Class A, Class B, and Class C networks can all be subnetted;
however, each class reserves a different number of bits for network information
and each class has a different number of host information bits that can be used
for subnet information.
f. Explain how subnetting on a LAN affects LAN devices.
g. Use Figure 9-4 to illustrate and explain a situation in which a LAN running IPv4
has been granted the Class C range of addresses that begin with 199.34.89.
Network+ Guide to Networks, 6th Edition
Teaching
Tip
9-5
Point out that several Web sites provide excellent tools to assist network
administrators in calculating subnet information. Provide a classroom
demonstration by navigating to http://www.subnetmask.info to illustrate one
such site.
CIDR (Classless Interdomain Routing)
1. Introduce and explain CIDR (Classless Interdomain Routing).
2. Mention that CIDR is sometimes called classless routing or supernetting.
3. Walk through an example of CIDR in which a subnet boundary moves to the left.
a. Emphasize that moving the subnet boundary to the left allows an administrator
to use more bits for host information and, therefore, generate more usable IP
addresses on the network.
b. Mention that a subnet created by moving the subnet boundary to the left is
known as a supernet.
4. Use Figure 9-5 to contrast examples of a Class C supernet mask with a subnet mask.
a. In Figure 9-5, point out that 27 bits are used for network information in the
subnet mask, whereas in the superset mask, only 22 bits are used for network
information.
5. Walk through an example where an organization has leased the Class C range of IPv4
addresses that shares the network ID 199.34.89.0 and, because of growth in the
company, the network administrator needs to increase the number of host addresses this
network allows by default.
a. Use Figure 9-6 to illustrate the process of calculating a host’s network ID on a
supernetted network.
6. Describe CIDR notation (or slash notation).
7. Define and describe a CIDR block.
8. Wrap up this topic by emphasizing that to take advantage of classless routing, a
network’s routers must be able to interpret IP addresses that do not adhere to
conventional network class parameters.
a. Routers that rely on older routing protocols, such as RIP, are not capable of
interpreting classless IP addresses.
Teaching
Tip
Point out that CIDR is pronounced cider.
Network+ Guide to Networks, 6th Edition
9-6
Subnetting in IPv6
1. Explain that IPv6 addresses are classless.
2. Explain that an IPv6 address divides into a 64-bit subnet prefix and 64-bit interface
identifier.
3. Use Figure 9-7 to show the prefix and interface portions of an IPv6 address.
4. Remind students that they may see IPv6 addresses containing a slash, such as
2608:FE10:1:A::/64, but that the left-most 64 bits of any IPv6 address are the subnet
portion of the address.
5. Explain how subnet prefixes may be assigned from a national NSP down to a local ISP
level, using Figure 9-8.
Internet Gateways
1. Define and explain a gateway.
2. Define the term default gateway.
3. Explain characteristics of default gateways.
4. Use Figure 9-9 to illustrate the use of default gateways.
5. Define and describe the advantages of a default router.
6. Describe two default gateway connections.
7. Note that routers used as gateways must maintain routing tables.
8. Describe the gateways that make up the Internet.
9. Define a core gateway.
Teaching
Tip
Student may read more about “Using Internet Gateway Device Discovery and
Control” at http://windowshelp.microsoft.com/Windows/en-US/help/670718ec7d51-49ed-87f1-b8a98ced11a41033.mspx
Address Translation
1. Define the term public network and provide examples.
2. Define the term private network and provide examples.
Network+ Guide to Networks, 6th Edition
9-7
3. Explain how hiding IP addresses on private networks allows network managers more
flexibility in assigning addresses.
4. Define the term NAT (Network Address Translation).
5. Describe reasons for using address translation.
6. Define and describe SNAT (Static Network Address Translation).
7. Use Figure 9-10 to illustrate SNAT.
8. Define and describe DNAT (Dynamic Network Address Translation).
9. Mention that DNAT is also called IP masquerading.
10. Define and describe PAT (Port Address Translation).
11. Use Figure 9-11 to illustrate an example of PAT usage.
12. Explain how the gateway might instead operate on a network host.
13. Describe how in Windows operating systems, ICS (Internet Connection Sharing) can be
used to translate network addresses and allow clients to share an Internet connection.
Teaching
Tip
Student may find a “Description of Internet Connection Sharing” at
http://support.microsoft.com/kb/234815
Quick Quiz 1
1. True or False: DHCP may be used to assign IP addresses and host names dynamically.
Answer: True
2. A node’s network ____ provides information about the segment or network to which
the node belongs.
a. frame
b. location
c. class
d. routing table
Answer: C
3. Subnetting separates a network into multiple logically defined segments, or
____________________.
Answer: subnets
Network+ Guide to Networks, 6th Edition
9-8
4. True or False: Subnet masks are only used in IPv4 classful addressing.
Answer: False
5. A broadcast address is known as a(n) ____ address for a network or segment.
a. reserved
b. default
c. open
d. informative
Answer: A
6. True or False: In CIDR, conventional network class distinctions exist.
Answer: False
TCP/IP Mail Services
1. Explain why it is important to understand how mail services work.
2. Point out that all Internet mail services rely on the same principles of mail delivery,
storage, and pickup, though they may use different types of software to accomplish
these functions.
3. Explain the function of mail servers.
4. Explain the function of mail clients.
5. Emphasize that e-mail servers and clients communicate through special TCP/IP
Application layer protocols.
SMTP (Simple Mail Transfer Protocol)
1. Define and describe SMTP.
2. Point out that SMTP transports mail and holds it in a queue.
3. Mention that in Internet e-mail transmission, higher-level mail protocols such as POP
and IMAP may attempt to figure out what went wrong with an undeliverable message.
4. Describe how to configure a client to use SMPT.
Teaching
Tip
Student may find more information on SMTP at
http://www.cisco.com/en/US/docs/ios/sw_upgrades/interlink/r2_0/user/ugsmtp.html
MIME (Multipurpose Internet Mail Extensions)
1. Explain the drawbacks of SMTP.
Network+ Guide to Networks, 6th Edition
9-9
2. Define and describe MIME as a solution to the ASCII character limit of 1,000.
a. Note that MIME is a standard for encoding and interpreting binary files, images,
video, and non-ASCII character sets within an e-mail message.
b. Point out that MIME identifies each element of a mail message according to
content type.
c. Mention that MIME encodes different content types so that SMTP is fooled into
thinking it is transporting an ASCII message stream.
3. Emphasize that MIME does not replace SMTP, but works in conjunction with it.
4. Note that most modern e-mail clients and servers support MIME.
POP (Post Office Protocol)
1. Define and describe POP.
2. Note the most current version.
3. Describe how POP3 mail is stored and delivered.
4. Describe the advantages of using POP3.
5. Emphasize that mail is deleted from the server after it is downloaded.
a. Explain why this can be troublesome for mobile users.
IMAP (Internet Message Access Protocol)
1. Point out that IMAP is a mail retrieval protocol that was developed as a more
sophisticated alternative to POP3.
2. Describe the advantages of IMAP.
3. Describe the features of IMAP.
4. Describe the disadvantages of IMAP.
Teaching
Tip
Students may find more information on how e-mail works at
http://communication.howstuffworks.com/email.htm
Additional TCP/IP Utilities
1. Note that there are many points of failure in a TCP transmission.
Network+ Guide to Networks, 6th Edition
9-10
2. Explain how TCP/IP attempts to help an administrator track down most TCP/IP-related
problems without using expensive software or hardware to analyze network traffic.
3. Emphasize why students should be familiar with TCP/IP diagnostic tools.
4. Review the Telnet, ARP, and ping utilities from Chapter 4.
5. Explain the benefits of the command prompt in accessing TCP/IP utilities.
6. Note that utility command syntax may differ, depending on the client’s operating
system.
Ipconfig
1. Define and explain the ipconfig utility.
a. Review the command switches.
b. Note that this command operates with Windows-based systems.
2. Use Figure 9-12 to illustrate the output of an ipconfig command on a Windows
workstation.
Teaching
Tip
Students may find more information on the syntax and options for using the
ipconfig diagnostic utility for network connections at
http://support.microsoft.com/kb/117662
Ifconfig
1. Define and explain the ifconfig utility.
a. Review the command switches.
b. Note that ifconfig is the UNIX and Linux version of ipconfig.
2. Use Figure 9-13 to illustrate detailed information available through ifconfig.
Teaching
Tip
Students may find more information on the syntax and options for the ifconfig
command at http://en.wikipedia.org/wiki/Ifconfig
Netstat
1. Define and explain the netstat utility.
a. Review the command switches.
2. Use Figure 9-14 to illustrate detailed output of a netstat –a command.
Network+ Guide to Networks, 6th Edition
Teaching
Tip
9-11
Students may read information on adding a GUI front end to the netstat command
line utility at http://articles.techrepublic.com.com/5100-10878_11-5149569.html
Nbtstat
1. Define and explain the nbtstat utility.
a. Note that nbtstat is useful only on networks that run Windows-based operating
systems and NetBIOS.
b. Review the command switches.
Teaching
Tip
Students may find more information on nbtstat at http://technet.microsoft.com/enus/library/cc940106.aspx
Hostname, Host, and Nslookup
1. Define and explain the hostname utility.
a. Note that the hostname utility is useful to a computer running the Windows,
UNIX, or Linux operating systems.
2. Define and explain the host utility.
a. Note that Windows requires a third-party version of host.
3. Define and explain the nslookup utility.
a. Note that this utility is useful in troubleshooting DNS resolution problems.
b. Use Figure 9-15 to illustrate the result of running a simple nslookup
command at a Linux shell prompt.
c. Review how to get help with the nslookup command switches.
Dig
1. Define and explain the dig utility.
a. Compare the dig command to the nslookup command.
b. Mention that dig is useful for helping network administrators diagnose DNS
problems.
c. Point out that the dig utility is included with UNIX and Linux operating
systems.
d. Mention that for Windows-based operating system, an administrator must obtain
the code for the dig utility from a third party and install it on your system.
2. Use Figure 9-16 to illustrate the output of a simple dig command.
Network+ Guide to Networks, 6th Edition
9-12
Whois
1. Review the basic steps that occur when a domain name is registered with ICAN.
2. Define and explain the whois utility.
a. Mention that whois utility is helpful in troubleshooting network problems.
b. Review the command syntax.
c. Mention that there are Web-based interfaces for running the whois command
Teaching
Tip
Demonstrate the use of the Whois command by navigating to
http://www.networksolutions.com/whois/index.jsp. Search for various
organizations.
Traceroute (Tracert)
1. Define and explain the traceroute utility.
a. Note that the utility is known as tracert on Windows-based systems and
tracepath on some Linux systems.
b. Walk through the steps traceroute takes to trace the path from one networked
node to another.
c. Describe the simplest form of the traceroute command.
2. Use Figure 9-17 to illustrate output of a traceroute command.
3. Review popular switches.
Mtr (my traceroute)
1. Define and explain the mtr utility.
a. Mention that it comes with UNIX and Linux operating systems.
b. Emphasis that the mtr utility combines the functions of the ping and traceroute
utilities and delivers an easy-to-read chart as its output.
c. Describe the simplest form of the mtr command.
d. Describe some popular MTR utility switches.
2. Use Figure 9-18 to illustrate the output of the command mtr –c 100 –r
www.cengage.com
3. Describe a program similar to mtr, pathping, which is available as a command-line
utility in Windows XP, Vista, Server 2003, and Server 2008.
Route
1. Define and explain the route utility.
Network+ Guide to Networks, 6th Edition
9-13
a. Describe the route command syntax for various operating systems and Ciscobrand routers.
2. Use Figure 9-19 to illustrate an example of a routing table.
3. Use Table 9-7 to explain the fields belonging to routing tables on UNIX or Linux
systems.
4. Review some options available for use with the route command.
5. Describe how to get help with route command options.
Quick Quiz 2
1. True or False: MIME is a standard for encoding and interpreting binary files, images,
video, and non-ASCII character sets within an e-mail message.
Answer: True
2. True or False: The MIME standard replaces SMTP.
Answer: False
3. ____________________ is a mail retrieval protocol that was developed as a more
sophisticated alternative to POP3.
Answer: MAP (Internet Message Access Protocol), Internet Message Access Protocol,
IMAP
4. True or False: The ipconfig utility is the TCP/IP configuration and management utility
used on UNIX and Linux systems.
Answer: False
5. ____ combines the functions of the ping and traceroute utilities
a. Tracert
b. Mtr
c. Whois
d. Route
Answer: B
Class Discussion Topics
1. Discuss the benefits of subnetting.
2. Discuss why IMAP is preferred over POP3.
Network+ Guide to Networks, 6th Edition
9-14
Additional Projects
1. Have the student research their favorite e-mail service. The students should determine
which Application layer protocols the e-mail system supports (SMTP, MIME, POP,
POP3, IMAP, etc.) and write a report on their findings. The report should also include a
description of the protocol set-up or configurations, if applicable.
2. Have student select five random companies, and issue the whois and traceroute
commands for each one. The student should prepare a report describing the results.
Require the use of screen shots to back up the reported findings.
Additional Resources
1. ARIN
https://www.arin.net/
2. SMTP
http://www.cisco.com/en/US/docs/ios/sw_upgrades/interlink/r2_0/user/ugsmtp.html
3. IMAP
http://en.wikipedia.org/wiki/Internet_Message_Access_Protocol
4. RFC 1009 Requirements for Internet Gateways (Historic)
http://tools.ietf.org/html/rfc1009
5. RFC 5034 The Post Office Protocol (POP3)
http://tools.ietf.org/html/rfc5034
Key Terms
 ANDing A logical process of combining bits. In ANDing, a bit with a value of 1 plus
another bit with a value of 1 results in a 1. A bit with a value of 0 plus any other bit
results in a 0.
 CIDR (Classless Interdomain Routing) An IP addressing and subnetting method in
which network and host information is manipulated without adhering to the limitations
imposed by traditional network class distinctions. CIDR is also known as classless
routing or supernetting. Older routing protocols, such as RIP, are not capable of
interpreting CIDR addressing schemes.
 CIDR block In CIDR notation, the number of bits used for an extended network prefix.
For example, the CIDR block for 199.34.89.0/22 is /22.
 CIDR notation In CIDR, a method of denoting network IDs and their subnet
boundaries. Slash notation takes the form of the network ID followed by a slash (/),
followed by the number of bits that are used for the extended network prefix.
Network+ Guide to Networks, 6th Edition
9-15
 classful addressing An IP addressing convention that adheres to network class
distinctions, in which the first 8 bits of a Class A address, the first 16 bits of a Class B
address, and the first 24 bits of a Class C address are used for network information.
 Classless Interdomain Routing See CIDR.
 classless routing See CIDR.
 core gateway A gateway that operates on the Internet backbone.
 default gateway The gateway that first interprets a device’s outbound requests, and
then interprets its inbound requests to and from other subnets. In a Postal Service
analogy, the default gateway is similar to a local post office.
 default router See default gateway.
 dig (domain information groper) A TCP/IP utility that queries the DNS database and
provides information about a host given its IP address or vice versa. Dig is similar to the
nslookup utility, but provides more information, even in its simplest form, than
nslookup can.
 DNAT (Dynamic Network Address Translation) A type of address translation in
which a limited pool of Internet-valid IP addresses is shared by multiple private
network hosts.
 domain information groper See dig.
 Dynamic Network Address Translation See DNAT.
 extended network prefix The combination of an IP address’s network ID and subnet
information. By interpreting the address’s extended network prefix, a device can
determine the subnet to which an address belongs.
 host A TCP/IP utility that at its simplest returns either the IP address of a host if its host
name is specified or its host name if its IP address is specified.
 hostname A TCP/IP utility used to show or modify a client’s host name.
 ICS (Internet Connection Sharing) A service provided with Windows operating
systems that allows one computer, the ICS host, to share its Internet connection with
other computers on the same network.
 ICS host On a network using the Microsoft Internet Connection Sharing service, the
computer whose Internet connection other computers share. The ICS host must contain
two network interfaces: one that connects to the Internet and one that connects to the
LAN.
 IMAP (Internet Message Access Protocol) A mail retrieval protocol that improves on
the shortcomings of POP. The single biggest advantage IMAP4 has relative to POP is
that it allows users to store messages on the mail server, rather than always having to
download them to the local machine. The most current version of IMAP is version 4
(IMAP4).
 IMAP4 (Internet Message Access Protocol, version 4) The most commonly used
form of the Internet Message Access Protocol (IMAP).
 Internet Connection Sharing See ICS.
 Internet Message Access Protocol See IMAP.
 Internet Message Access Protocol, version 4 See IMAP4.
 IP masquerading See DNAT.
 MIME (Multipurpose Internet Mail Extensions) A standard for encoding and
interpreting binary files, images, video, and non-ASCII character sets within an e-mail
message.
Network+ Guide to Networks, 6th Edition
9-16
 mtr (my traceroute) A route discovery and analysis utility that comes with UNIX and
Linux operating systems. Mtr combines the functions of the ping and traceroute
commands and delivers an easily readable chart as its output.
 Multipurpose Internet Mail Extensions See MIME.
 my traceroute See mtr.
 NAT (Network Address Translation) A technique in which IP addresses used on a
private network are assigned a public IP address by a gateway when accessing a public
network.
 nbtstat A TCP/IP troubleshooting utility that provides information about NetBIOS
names and their addresses. If you know the NetBIOS name of a workstation, you can
use nbtstat to determine its IP address.
 NetBIOS A protocol that runs in the Session and Transport layers of the OSI model and
associates NetBIOS names with workstations. NetBIOS alone is not routable because it
does not contain Network layer information. However, when encapsulated in another
protocol such as TCP/IP, it can be routed.
 netstat A TCP/IP troubleshooting utility that displays statistics and the state of current
TCP/IP connections. It also displays ports, which can signal whether services are using
the correct ports.
 Network Address Translation See NAT.
 network number See network ID.
 network prefix See network ID.
 nslookup A TCP/IP utility that allows you to look up the DNS host name of a network
node by specifying its IP address, or vice versa. This ability is useful for verifying that a
host is configured correctly and for troubleshooting DNS resolution problems.
 PAT (Port Address Translation) A form of address translation that uses TCP port
numbers to distinguish each client’s transmission, thus allowing multiple clients to
share a limited number of Internet-recognized IP addresses.
 pathping A command-line utility that combines the functionality of the tracert and ping
commands (similar to UNIX’s mtr command) and comes with Windows operating
systems.
 POP (Post Office Protocol) An Application layer protocol used to retrieve messages
from a mail server. When a client retrieves mail via POP, messages previously stored on
the mail server are downloaded to the client’s workstation, and then deleted from the
mail server.
 POP3 (Post Office Protocol, version 3) The most commonly used form of the Post
Office Protocol.
 Port Address Translation See PAT.
 Post Office Protocol See POP.
 Post Office Protocol, version 3 See POP3.
 private network A network whose access is restricted to only clients or machines with
proper credentials.
 public network A network that any user can access with no restrictions. The most
familiar example of a public network is the Internet.
 route A utility for viewing or modifying a host’s routing table.
 route prefix The prefix in an IPv6 address that identifies a route. Because route
prefixes vary in length, slash notation is used to define them. For example, the route
prefix indicated by 2608:FE10::/32 includes all subnets whose prefixes begin with
2608:FE10 and, consequently, all interfaces whose IP addresses begin with 2608:FE10.
Network+ Guide to Networks, 6th Edition
9-17
 Simple Mail Transfer Protocol See SMTP.
 slash notation See CIDR notation.
 SMTP (Simple Mail Transfer Protocol) The Application layer TCP/IP subprotocol
responsible for moving messages from one e-mail server to another.
 SNAT (Static Network Address Translation) A type of address translation in which
each private IP address is correlated with its own Internet-recognized IP address.
 Static Network Address Translation See SNAT.
 subnet prefix The 64-bit prefix in an IPv6 address that identifies a subnet. A single
IPv6 subnet is capable of supplying 18,446,744,073,709,551,616 IPv6 addresses.
 supernet In IPv4, a type of subnet that is created by moving the subnet boundary to the
left and using bits that normally would be reserved for network class information.
 supernet mask A 32-bit number that, when combined with a device’s IPv4 address,
indicates the kind of supernet to which the device belongs.
 supernetting See CIDR.
 tracepath A version of the traceroute utility found on some Linux distributions.
 traceroute (tracert) A TCP/IP troubleshooting utility that uses ICMP to trace the path
from one networked node to another, identifying all intermediate hops between the two
nodes. Traceroute is useful for determining router or subnet connectivity problems. On
Windows-based systems, the utility is known as tracert.
Download