Network analyzer help

Contents

Tools Query

The various tools query page enables you to specify the Ip or host/website name

to evaluate (you’ll be able to go into the full

URL, the website name is extracted instantly) along with the type

from the query to do. The totally initiated by pressing the eco-friendly

Start button within the top-right corner from the screen.

Ping

The

Ping tool may be used to determine the

round-trip delay involving the tool and the examined device or see whether the

examined system is reachable. To operate properly,

ICMP packets should not be filtered through the router and also the receiving device needs to

react to ping demands. The parameter Probe delay sets the

frequency of ping probes. The default value is once per second. The

Payload size parameter enables setting how big the ping

packet excluding how big the packet header.

Once began, the ping display starts showing the probes sent to another

device along with the round-trip delay time. Ping could be stopped

by pressing the red Stop button within the top-right corner. If

no fact is caused by the remote device, the indicator stays

grey (otherwise it turns eco-friendly) with no round-trip delay information

is proven. When available, also hostname and flag indicating the place

from the remote server are displayed.

After pressing an entry, additional information concerning the remote server are proven.

Particularly, in addition to the Ip, hostname and round-trip delay,

there are other information regarding the position of the server along with

a roadmap showing the server’s approximate location. The place information

is IP-address-based so it may be very inaccurate sometimes. When available,

even the

autonomous system number and name from the network are displayed.

The

Statistics entry reveals a webpage using the graphical representation

of ping occasions and extra ping statistics. The display is live and

statistics are computed even if ping is running.

Route

The

Route option provides the

traceroute tool that you can use to look for the network nodes in order to

the server. Normally Network Analyzer transmits new probes immediately

after getting a response in the server for that previous node. The

Min. delay parameter may be used to slow lower the rate by

the required period of time between your probes. The

Max. delay parameter can be used like a wait time when no response

is caused by the server. Observe that as a whole 3 probes are delivered to

each node, therefore the total time spent on one node is 3-occasions the

specified time. The UDP probes parameter enables using UDP

probes rather from the default ICMP probes. This might help to penetrate

certain firewalls.

Tools Query

The various tools query page enables you to specify the Ip or host/website name

to evaluate (you’ll be able to go into the full

URL, the website name is extracted instantly) along with the type

from the query to do. The totally initiated by pressing the eco-friendly

Start button within the top-right corner from the screen.

Ping

The

Ping tool may be used to determine the

round-trip delay involving the tool and the examined device or see whether the

examined system is reachable. To operate properly,

ICMP packets should not be filtered through the router and also the receiving device needs to

react to ping demands. The parameter Probe delay sets the

frequency of ping probes. The default value is once per second. The

Payload size parameter enables setting how big the ping

packet excluding how big the packet header.

Once began, the ping display starts showing the probes sent to another

device along with the round-trip delay time. Ping could be stopped

by pressing the red Stop button within the top-right corner. If

no fact is caused by the remote device, the indicator stays

grey (otherwise it turns eco-friendly) with no round-trip delay information

is proven. When available, also hostname and flag indicating the place

from the remote server are displayed.

After pressing an entry, additional information concerning the remote server are proven.

Particularly, in addition to the Ip, hostname and round-trip delay,

there are other information regarding the position of the server along with

a roadmap showing the server’s approximate location. The place information

is IP-address-based so it may be very inaccurate sometimes. When available,

even the

autonomous system number and name from the network are displayed.

The

Statistics entry reveals a webpage using the graphical representation

of ping occasions and extra ping statistics. The display is live and

statistics are computed even if ping is running.

Route

The

Route option provides the

traceroute tool that you can use to look for the network nodes in order to

the server. Normally Network Analyzer transmits new probes immediately

after getting a response in the server for that previous node. The

Min. delay parameter may be used to slow lower the rate by

the required period of time between your probes. The

Max. delay parameter can be used like a wait time when no response

is caused by the server. Observe that as a whole 3 probes are delivered to

each node, therefore the total time spent on one node is 3-occasions the

specified time. The UDP probes parameter enables using UDP

probes rather from the default ICMP probes. This might help to penetrate

certain firewalls.

Once began, the traceroute display starts showing their email list of devices

in order to the destination. The format from the output is comparable

towards the creation of the Ping tool. The round-trip delay time

proven within the list matches the

median worth of the 3 probes sent. Much like

Ping, after clicking an entry, the facts display seems

with a lot more data concerning the server node. There’s additionally a shortcut

button to help query the given node using the tools.

Towards the top of the traceroute list, there’s the

Visual Route entry which reveals all of the nodes shown on

the map. Each one of the pins could be drawn on to show a bubble using the

node number and round-trip time (or ranges once the given location

matches multiple network nodes). The eco-friendly pin matches

the destination location, nowhere pin to the present location.

The place information is dependant on the node’s IP addresses. Network Analyzer uses the MaxMind

GeoIP databases offered at

www.maxmind.com. In some cases (e.g., once the IP is owned by an worldwide

company using the seat inside a different country or when

anycast can be used), the place information matches the organization seat

as opposed to the actual server location. At the best, IP-based location

services supply the city, in which the IP is situated, but can’t be used

to supply its exact place.

Ports

The

Ports option starts a

port scanner which helps you to scan the given host for open TCP

ports. This could identify services running around the scanned device. Using the

Common option selected, just the most generally used ports

are scanned. Using the All option, all ports within the specified

range are scanned.

Once began a progress bar seems in the top end from the screen together

using the current port being scanned and numerous ports left. Note

the details about ports being closed or open may be shown

as time passes due to the network delay.

Open ports (indicating the services are available) are marked having a

eco-friendly indicator. Port number and port name along with its description

are proven for open ports. Additionally, if another application is registered

for that given service, you’ll be able to open the application using the given

URL by tapping the entry (the right arrow seems for such records).

Closed ports and ports blocked with a firewall are displayed with red

and grey indicators, correspondingly, along with the corresponding

port ranges.

Whois

The

Whois option reveals the

domain’s entry in the public

Whois database. The output could be zoomed-in/out for much better readability.

DNS

The

DNS option serves for conducting a

DNS lookup for your own domain name or perhaps a

reverse DNS lookup when an Ip is joined. Automatically, the machine DNS server is

employed for the query, but it may be overridden if needed. By selecting

Show DNSSEC you’ll be able to request

DNSSEC, records that are then displayed within the result when available. Status

from the totally displayed within the first row from the result page (the

output matches

dig). Individual records are highlighted below, grouped through the record type.

The next query types are supported: ANY, A, AAAA, CAA, CNAME,

MX, NAPTR, NS, PTR, SOA, SRV, and TXT. Additionally, when conducting

the ANY query, a lot more record types are decoded, including DNSSEC

records. Presently unsupported record types are proven within the generic

RFC 3597 format. To learn more concerning the individual records and also the

displayed fields, please refer for example to

this Wikipedia article.

Speed

Resourse: https://techet.internet/netanalyzer/

Computer Networks: Crash Course Computer Science #28