(rev. 01/01/2008) 
 
Notes On Chapter Two 
-- Motivation and Tools
 Chapter Two: Motivation And Tools 
 
-  2.1 Introduction 
 -  2.2 Resource Sharing
     
     -  People want networks so they can share printers, share files, share
	  powerful CPU's.
     
 -  At the time that the Internet got its start, the sharing of powerful
	  computers was important to researchers working at government
	  laboratories.
  
     
 -  The Department of Defense is also said to have been interested in
	  developing a network that could continue to function even after
	  being heavily damaged.
     
 -  ARPA put together a large group of the best and brightest
	  individuals available and they created the Internet.  The story
	  has something of the flavor of the story of the Manhattan
	  project.
     
 
 
 
 -  2.3 Growth of the Internet 
     
     -  Plots show that the number of hosts (computers) on the Internet
	  approximately doubled every 9-12 months from 1981 through 2003.
     
 -  What has been the relative growth in various areas of the world?
           
 -  2.4 Probing the Internet -- use of ping
     
     -  Who keeps track of how big the Internet is getting, and how do
	  they do that?  Nowadays it is done using DNS queries, ping, and
	  statistical sampling techniques.  Check out details here:   Internet Software Consortium 
     
 -  Everybody who troubleshoots Internet connections should know about
	  ping.  It is the first tool you use to see if you can reach a
	  host from where you are.  (Do a demo of ping.)  Ping is basically
	  just an echo-response test.  You send a packet to a host, and it
	  replies by sending a packet back to you.
      
 -  Ping command: ping altair.csustan.com
      
 -  Ping command: ping -s altair.csustan.com
     
 
 
 
 -  2.5 Interpreting A Ping Response.
     
     -  It can be hard to tell what is the reason for a failure.  A link
	  could be down, a host could be down, software on the host could
	  have failed, software in the target network could be configured
	  to refuse to reply to ping requests.  
     
 -  What is a scenario that illustrates the use of ping?  If your
	  local host is having troubles and you know which remote hosts it
	  depends upon for services, you can ping all those remote servers
	  to see which one(s) your local machine is having trouble
	  reaching.  This helps point you in the direction of what needs to
	  be fixed.
     
 
 
 -  2.6 Tracing A Route -- do a demo of use of the traceroute utility
     
     -  When you send a packet from computer X across the Internet to
	  computer Y, it usually travels through a series of other
	  computers (routers) along the way. You can use traceroute to
	  identify those intermediate computers.
     
 -  Some of the routers may not respond to traceroute and therefore
	  traceroute may not discover all of them.
     
 -  Although routes tend to be pretty stable over short time spans,
	  two packets sent from X to Y may travel different routes at
	  different times.  The information obtained from traceroute can be
	  misleading.
     
 
 
 
 -  2.7 Summary
     
     -  Flavors of Unix include ping, traceroute and other network utilities
	  in their system software distributions.
     
 -  Personal computer users may not have these utilities "built-in."
	  However, one can download software packages that include ping and
	  traceroute, or one can get access to ping and traceroute servers on
	  the world wide web.  Search
     
 -  Search TUCOWS  for ping
	  software.
     
 -  If you want a web-base ping or traceroute server then look at
	   this 
           
           SLAC page
           
     
 -  
           
           Network-Tools
           
     
 -  
           
           Just-Ping