Use the ethereal output and the previously saved routing table to explain the operation of traceroute.

What will be an ideal response?


Traceroute output from PC1 to PC4:
```
traceroute to 10.0.3.41 (10.0.3.41), 30 hops max, 38 byte packets
1 10.0.1.21 (10.0.1.21) 1.968 ms 0.355 ms 0.202 ms
2 10.0.2.1 (10.0.2.1) 1.642 ms 0.559 ms 0.475 ms
3 10.0.3.41 (10.0.3.41) 0.442 ms 0.339 ms 0.380 ms
```
Routing table on PC1

```
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
10.0.1.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0
10.0.2.0 10.0.1.21 255.255.255.0 UG 0 0 0 eth0
10.0.3.0 10.0.1.21 255.255.255.0 UG 0 0 0 eth0
127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 lo
```
Routing table on PC2
```
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
10.0.1.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0
10.0.2.0 0.0.0.0 255.255.255.0 U 0 0 0 eth1
10.0.3.0 10.0.2.1 255.255.255.0 UG 0 0 0 eth1
127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 lo
```
Routing table on PC4
```
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
10.0.1.0 10.0.3.1 255.255.255.0 UG 0 0 0 eth0
10.0.2.0 10.0.3.1 255.255.255.0 UG 0 0 0 eth0
10.0.3.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0
127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 lo
```
Routing table on Router1
```
Router1#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default
U - per-user static route, o - ODR
Gateway of last resort is not set
10.0.0.0/24 is subnetted, 3 subnets
C 10.0.2.0 is directly connected, Ethernet0
C 10.0.3.0 is directly connected, Ethernet1
S 10.0.1.0 [1/0] via 10.0.2.22
```

Computer Science & Information Technology

You might also like to view...

Software tools can be categorized as either "lossy" or "lossless". Which of the following tools are considered lossy?

a. Windows Explorer b. A raw disk editor c. A disk imaging utility d. A network capture utility

Computer Science & Information Technology

Discuss the use of the Replace dialog.

What will be an ideal response?

Computer Science & Information Technology

An advantage of chaining methods together is that you can perform complex tasks with a minimal amount of programming code.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

_________ is the way in which the components are interrelated.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology