(Latest Revision: 09/04/2002) 
 
Notes On Chapter Two 
-- Motivation and Tools
 Chapter Two: Motivation And Tools; 
 
-  2.1 Introduction 
 -  2.2 Resource Sharing: 
     
     -  e.g. share printers, share files, share powerful CPU's.  
     
 -  How does this relate to stories about how the Internet got
	  started?  Some stories claim that the original motivation was to
	  get a network that would survive a nuclear attack.  Comer claims
	  that it was ARPA's desire to share powerful CPU's among
	  scientists who needed to analyze large data sets.
     
 -  ARPA put together a large group of the best and brightest
	  individuals available and they created the Internet.  The story
	  has something of the flavor of the story of the Manhattan
	  project.
     
 
 
 -  2.3 Growth of the Internet 
     
     -  Log plots show that the number of hosts (computers) on the
	  Internet has been doubling every 9-12 months since the early
	  '80's.  
     
 -  What has been the relative growth in various areas of the world?
	   1997 Internet
	  Penetration
     
 
 
 -  2.4 Probing the Internet -- use of ping
     
     -  Who keeps track of how big the Internet is getting, and how do
	  they do that?  Nowadays it is done using DNS queries, ping, and
	  statistical sampling techniques.  Check out details here:   Internet Software Consortium 
     
 -  Everbody who troubleshoots Internet connections should know about
	  ping.  It is the first tool you use to see if you can reach a
	  host from where you are.  (Do a demo of ping.)  Ping is basically
	  just an echo-response test.  You send a packet to a host, and it
	  replies by sending a packet back to you.
      
 -  Ping command: ping altair.csustan.com
      
 -  Ping command: ping -s altair.csustan.com
     
 
 
 -  2.5 Interpreting A Ping Response.  
     
     -  It can be hard to tell what is the reason for a failure.  A link
	  could be down, a host could be down, software on the host could
	  have failed, software in the target network could be configured
	  to refuse to reply to ping requests.  
     
 -  What is a scenario that illustrates the use of ping?  If your
	  local host is having troubles and you know which remote hosts it
	  depends upon for services, you can ping all those remote servers
	  to see which one(s) your local machine is having trouble
	  reaching.  This helps point you in the direction of what needs to
	  be fixed.
     
 
 
 -  2.6 Tracing A Route -- do a demo of use of the traceroute utility
     
     -  When you send a packet from computer X across the Internet to
	  computer Y, it usually travels through a series of other
	  computers (routers) along the way. You can use traceroute to
	  identify those intermediate computers.
     
 -  Some of the routers may not respond to traceroute and therefore
	  traceroute may not discover all of them.
     
 -  Although routes tend to be pretty stable over short time spans,
	  two packets sent from X to Y may travel different routes at
	  different times.  The information obtained from traceroute can be
	  misleading.
     
 -  
     
 
 
 -  2.7 Summary
     
     -  Flavors of Unix include ping, traceroute and other network
	  utilities in their system software distributions.
     
 -  Personal computer users may not have these utilities "built-in."
	  However, one can download software packages that include ping and
	  traceroute, or one can get access to ping and traceroute servers
	  on the world wide web.  Search
     
 -  Search TUCOWS  for ping
	  software.
     
 -  If you want a web-base ping or traceroute server then look at
	   this SLAC
	   page.