Network analyzer help
Contents
- Tools Query
- Ping
- Route
- Tools Query
- Ping
- Route
- Ports
- Whois
- DNS
- Computer Networks: Crash Course Computer Science #28
Tools Query
The various tools query page enables you to specify the Ip or host/website name
to evaluate (you’ll be able to go into the full
URL, the website name is extracted instantly) along with the type
from the query to do. The totally initiated by pressing the eco-friendly
Start button within the top-right corner from the screen.
Ping
The
Ping tool may be used to determine the
round-trip delay involving the tool and the examined device or see whether the
examined system is reachable. To operate properly,
ICMP packets should not be filtered through the router and also the receiving device needs to
react to ping demands. The parameter Probe delay sets the
frequency of ping probes. The default value is once per second. The
Payload size parameter enables setting how big the ping
packet excluding how big the packet header.
Once began, the ping display starts showing the probes sent to another
device along with the round-trip delay time. Ping could be stopped
by pressing the red Stop button within the top-right corner. If
no fact is caused by the remote device, the indicator stays
grey (otherwise it turns eco-friendly) with no round-trip delay information
is proven. When available, also hostname and flag indicating the place
from the remote server are displayed.
After pressing an entry, additional information concerning the remote server are proven.
Particularly, in addition to the Ip, hostname and round-trip delay,
there are other information regarding the position of the server along with
a roadmap showing the server’s approximate location. The place information
is IP-address-based so it may be very inaccurate sometimes. When available,
even the
autonomous system number and name from the network are displayed.
The
Statistics entry reveals a webpage using the graphical representation
of ping occasions and extra ping statistics. The display is live and
statistics are computed even if ping is running.
Route
The
Route option provides the
traceroute tool that you can use to look for the network nodes in order to
the server. Normally Network Analyzer transmits new probes immediately
after getting a response in the server for that previous node. The
Min. delay parameter may be used to slow lower the rate by
the required period of time between your probes. The
Max. delay parameter can be used like a wait time when no response
is caused by the server. Observe that as a whole 3 probes are delivered to
each node, therefore the total time spent on one node is 3-occasions the
specified time. The UDP probes parameter enables using UDP
probes rather from the default ICMP probes. This might help to penetrate
certain firewalls.
Tools Query
The various tools query page enables you to specify the Ip or host/website name
to evaluate (you’ll be able to go into the full
URL, the website name is extracted instantly) along with the type
from the query to do. The totally initiated by pressing the eco-friendly
Start button within the top-right corner from the screen.
Ping
The
Ping tool may be used to determine the
round-trip delay involving the tool and the examined device or see whether the
examined system is reachable. To operate properly,
ICMP packets should not be filtered through the router and also the receiving device needs to
react to ping demands. The parameter Probe delay sets the
frequency of ping probes. The default value is once per second. The
Payload size parameter enables setting how big the ping
packet excluding how big the packet header.
Once began, the ping display starts showing the probes sent to another
device along with the round-trip delay time. Ping could be stopped
by pressing the red Stop button within the top-right corner. If
no fact is caused by the remote device, the indicator stays
grey (otherwise it turns eco-friendly) with no round-trip delay information
is proven. When available, also hostname and flag indicating the place
from the remote server are displayed.
After pressing an entry, additional information concerning the remote server are proven.
Particularly, in addition to the Ip, hostname and round-trip delay,
there are other information regarding the position of the server along with
a roadmap showing the server’s approximate location. The place information
is IP-address-based so it may be very inaccurate sometimes. When available,
even the
autonomous system number and name from the network are displayed.
The
Statistics entry reveals a webpage using the graphical representation
of ping occasions and extra ping statistics. The display is live and
statistics are computed even if ping is running.
Route
The
Route option provides the
traceroute tool that you can use to look for the network nodes in order to
the server. Normally Network Analyzer transmits new probes immediately
after getting a response in the server for that previous node. The
Min. delay parameter may be used to slow lower the rate by
the required period of time between your probes. The
Max. delay parameter can be used like a wait time when no response
is caused by the server. Observe that as a whole 3 probes are delivered to
each node, therefore the total time spent on one node is 3-occasions the
specified time. The UDP probes parameter enables using UDP
probes rather from the default ICMP probes. This might help to penetrate
certain firewalls.
Once began, the traceroute display starts showing their email list of devices
in order to the destination. The format from the output is comparable
towards the creation of the Ping tool. The round-trip delay time
proven within the list matches the
median worth of the 3 probes sent. Much like
Ping, after clicking an entry, the facts display seems
with a lot more data concerning the server node. There’s additionally a shortcut
button to help query the given node using the tools.
Towards the top of the traceroute list, there’s the
Visual Route entry which reveals all of the nodes shown on
the map. Each one of the pins could be drawn on to show a bubble using the
node number and round-trip time (or ranges once the given location
matches multiple network nodes). The eco-friendly pin matches
the destination location, nowhere pin to the present location.
The place information is dependant on the node’s IP addresses. Network Analyzer uses the MaxMind
GeoIP databases offered at
www.maxmind.com. In some cases (e.g., once the IP is owned by an worldwide
company using the seat inside a different country or when
anycast can be used), the place information matches the organization seat
as opposed to the actual server location. At the best, IP-based location
services supply the city, in which the IP is situated, but can’t be used
to supply its exact place.
Ports
The
Ports option starts a
port scanner which helps you to scan the given host for open TCP
ports. This could identify services running around the scanned device. Using the
Common option selected, just the most generally used ports
are scanned. Using the All option, all ports within the specified
range are scanned.
Once began a progress bar seems in the top end from the screen together
using the current port being scanned and numerous ports left. Note
the details about ports being closed or open may be shown
as time passes due to the network delay.
Open ports (indicating the services are available) are marked having a
eco-friendly indicator. Port number and port name along with its description
are proven for open ports. Additionally, if another application is registered
for that given service, you’ll be able to open the application using the given
URL by tapping the entry (the right arrow seems for such records).
Closed ports and ports blocked with a firewall are displayed with red
and grey indicators, correspondingly, along with the corresponding
port ranges.
Whois
The
Whois option reveals the
domain’s entry in the public
Whois database. The output could be zoomed-in/out for much better readability.
DNS
The
DNS option serves for conducting a
DNS lookup for your own domain name or perhaps a
reverse DNS lookup when an Ip is joined. Automatically, the machine DNS server is
employed for the query, but it may be overridden if needed. By selecting
Show DNSSEC you’ll be able to request
DNSSEC, records that are then displayed within the result when available. Status
from the totally displayed within the first row from the result page (the
output matches
dig). Individual records are highlighted below, grouped through the record type.
The next query types are supported: ANY, A, AAAA, CAA, CNAME,
MX, NAPTR, NS, PTR, SOA, SRV, and TXT. Additionally, when conducting
the ANY query, a lot more record types are decoded, including DNSSEC
records. Presently unsupported record types are proven within the generic
RFC 3597 format. To learn more concerning the individual records and also the
displayed fields, please refer for example to
this Wikipedia article.
Resourse: https://techet.internet/netanalyzer/