Excellent explanation and visuals. As a lecturer in IT (infrastructure, Cybersecurity) I will be using your video content in lecture classes. Appreciate the uploads!
traceroute and ping are good as base tools for quick diagnostics and network troubleshooting. In addition it's good to note that other tools (like mtr for example) and wrappers can be used to get more stats, info (like whois ASN, registry, ..), graphs, etc.
Great tutorial, can you post video on how to perform port mirroring in Windows Also please make video about ICMP and how ping is a portless protocol I would also request you to make video on Port Binding and socket creation I really want to study this topics from you. Appreciate your efforts
I have a question, I hope you can read it. Would you suggest the installation of wireshark, even if you are not troubleshooting any end users, only for private reasons?
I ran a tracert and received several asterisks (and "request timed out" messages) for many hops. Then one subsequent hop showed times. Afterwards, all remaining hops (limit = 30) showed asterisks and timed out messages. What message should be inferred?
Is it possible to use this technology to see what hardware is sending data to your computer? eg. screen capture hardware sending data packets, or can that kind of specificity not be attained?
I tried to filter wireshark using icmp after typing trace route command in both command prompt and linux , but i did not see any results, can you help me resolve the issue
Thank you, it was very nice explanation. I got one doubt, I understand that TTL value increases each time, and it sends, and we continue getting Time exceeded value, Type(11), what would be the reply, when it reaches destination.
Nice video as always, Near the end where you mentioned that a hop might have a big response time (like 500ms) and we would know that the specific hop causes delay problems, what then? How you bypass that node / hop afterwards? Do you just find out to whom this hop belongs to and send an email letting them know for instance?
As you said "e.g. if the hop is taking around 500ms to respond is potentially bottle naking the traffic." Is there any specific limit of time to ensure that? Thanks
First hop may high depending on your internet speed, though most likely less than about 60ms, unless you are saturating your connection. Certain other hops may be high if server is on another continent, and traveling under the ocean but still under 200ms (wild guess).
I can see a lot of "request timed out" in your examples, so I was wondering what would be the potentials reasons why a hop doesn't respond to an icmp with expired ttl ?
Never have I regretted subscribing to this channel
Great to hear! Love having you as a subscriber!
right ?!!!
Excellent explanation and visuals. As a lecturer in IT (infrastructure, Cybersecurity) I will be using your video content in lecture classes. Appreciate the uploads!
Thanks Mark! Great to hear you liked the video, especially as a lecturer yourself. I hope your classes get some value from it.
Always know I'm in for a treat when certbros drops in my notifications. Never dissapointed
I'm always in for a treat when Don Neto comments 😁 Thanks man, really appreciate it!
@@Certbros haha no problem at all 😊
You are a very good teacher and your videos are very much appreciated. Thank you!
Im a beginner, and DAAAAMN, this is a comprehensive video for dummies like me.
traceroute and ping are good as base tools for quick diagnostics and network troubleshooting. In addition it's good to note that other tools (like mtr for example) and wrappers can be used to get more stats, info (like whois ASN, registry, ..), graphs, etc.
great explanation... thanks a lot for clear graphical representation.
CertBros never disappoints. 🙌🏼💯
Very nicely explained. Thanks 😊
Thank you Parveez! Glad you liked it 👍
Nice one. Clearly explained. Thanks. 😁
good explanation and clearly understood .
Easy and detailed explanation.
Great job, we’ll spoken!
Please do a video on all the ways you can use NS lookup. Explaining all the various DNS record types would be a good one too.
Great explanation
Thanks Lalith! Always one of the first people to comment 🙏
IIRC, traceroute wasn't designed into networks and the internet, but someone clever figured out you could use the TTL value to find the hops.
great visualization, what tool you used to create it?
Very well explained 👏 👌
Thank you Sajesh! Glad you liked it.
excellent explanation sir.
Cool vid. Very informative 👍
Thank you for this tutorial.
excellent! love your channel. thank you!
Can you please tell what tool you used to create the animation?
a very good explanation
great explanation thanks for this video
excellent video keep it up👍
Thank you!
You're welcome!
Awsome explanation
Have used tracert all my life, only learned the mechanism now 😂😂
Great tutorial, can you post video on how to perform port mirroring in Windows
Also please make video about ICMP and how ping is a portless protocol
I would also request you to make video on Port Binding and socket creation
I really want to study this topics from you.
Appreciate your efforts
Very Nice , Good learn
I loved this video.
Thanks for the knowledge
Is there any API to identify the source and destination?
May I know why tracert cmd was taking max of 30 hops?
I have a question, I hope you can read it. Would you suggest the installation of wireshark, even if you are not troubleshooting any end users, only for private reasons?
I ran a tracert and received several asterisks (and "request timed out" messages) for many hops. Then one subsequent hop showed times. Afterwards, all remaining hops (limit = 30) showed asterisks and timed out messages. What message should be inferred?
Is it possible to use this technology to see what hardware is sending data to your computer? eg. screen capture hardware sending data packets, or can that kind of specificity not be attained?
Did the tracert crap out because you used a private scope that wasn't a part of your network?
I tried to filter wireshark using icmp after typing trace route command in both command prompt and linux , but i did not see any results, can you help me resolve the issue
Thank you, it was very nice explanation. I got one doubt, I understand that TTL value increases each time, and it sends, and we continue getting Time exceeded value, Type(11), what would be the reply, when it reaches destination.
Nice video as always, Near the end where you mentioned that a hop might have a big response time (like 500ms) and we would know that the specific hop causes delay problems, what then? How you bypass that node / hop afterwards?
Do you just find out to whom this hop belongs to and send an email letting them know for instance?
I really want to see this question answer .
Me too.
As you said "e.g. if the hop is taking around 500ms to respond is potentially bottle naking the traffic."
Is there any specific limit of time to ensure that?
Thanks
First hop may high depending on your internet speed, though most likely less than about 60ms, unless you are saturating your connection. Certain other hops may be high if server is on another continent, and traveling under the ocean but still under 200ms (wild guess).
QUESTION : Is it ROOT or RRRR-OUT as in Route?
I can see a lot of "request timed out" in your examples, so I was wondering what would be the potentials reasons why a hop doesn't respond to an icmp with expired ttl ?
some hops can have icmp disabled but will still pass traffic
Please note ICMP is blocked by many switches so ping and traceroute work intermittently.
I never realized how painful it was to hear someone say "rooter" Lol.
Not as painful as it is to pronounce it r-out-er 😆
why are there 3 packets sent tho
thanks
👍
thx for the vide
Thank you Christopher!
Liiiiikkkkkkeeeeeee 😄
subscribed
Traceroot
🥲life saver
No problem! Glad you liked the video