Which protocol is used by the traceroute command to send and receive echo requests?

For a Microsoft Windows 2000 version of this article, see 162326.

Summary

This article describes TRACERT (Trace Route), a command-line utility that you can use to trace the path that an Internet Protocol (IP) packet takes to its destination.

This article discusses the following topics:

  • How to Use the TRACERT Utility

  • How to Use TRACERT to Troubleshoot

  • How to Use TRACERT Options

More Information

How to Use the TRACERT Utility

The TRACERT diagnostic utility determines the route to a destination by sending Internet Control Message Protocol (ICMP) echo packets to the destination. In these packets, TRACERT uses varying IP Time-To-Live (TTL) values. Because each router along the path is required to decrement the packet's TTL by at least 1 before forwarding the packet, the TTL is effectively a hop counter. When the TTL on a packet reaches zero (0), the router sends an ICMP "Time Exceeded" message back to the source computer.

TRACERT sends the first echo packet with a TTL of 1 and increments the TTL by 1 on each subsequent transmission, until the destination responds or until the maximum TTL is reached. The ICMP "Time Exceeded" messages that intermediate routers send back show the route. Note however that some routers silently drop packets that have expired TTLs, and these packets are invisible to TRACERT.

TRACERT prints out an ordered list of the intermediate routers that return ICMP "Time Exceeded" messages. Using the -d option with the tracert command instructs TRACERT not to perform a DNS lookup on each IP address, so that TRACERT reports the IP address of the near-side interface of the routers.

In the following example of the tracert command and its output, the packet travels through two routers (157.54.48.1 and 11.1.0.67) to get to host 11.1.0.1. In this example, the default gateway is 157.54.48.1 and the IP address of the router on the 11.1.0.0 network is at 11.1.0.67.

The command:

C:\>tracert 11.1.0.1
The output from the command:

Tracing route to 11.1.0.1 over a maximum of 30 hops
---------------------------------------------------
1 2 ms 3 ms 2 ms 157.54.48.1
2 75 ms 83 ms 88 ms 11.1.0.67
3 73 ms 79 ms 93 ms 11.1.0.1

Trace complete.

How to Use TRACERT to Troubleshoot

You can use TRACERT to find out where a packet stopped on the network. In the following example, the default gateway has found that there is no valid path for the host on 22.110.0.1. Probably, either the router has a configuration problem, or the 22.110.0.0 network does not exist, reflecting a bad IP address.

The command:

C:\>tracert 22.110.0.1
The output from the command:

Tracing route to 22.110.0.1 over a maximum of 30 hops
-----------------------------------------------------
1 157.54.48.1 reports: Destination net unreachable.

Trace complete.
TRACERT is useful for troubleshooting large networks where several paths can lead to the same point or where many intermediate components (routers or bridges) are involved.

How to Use TRACERT Options

There are several command-line options that you can use with TRACERT, although the options are not usually necessary for standard troubleshooting.

The following example of command syntax shows all of the possible options:

tracert -d -h maximum_hops -j host-list -w timeout target_hostWhat the parameters do:

-d
Specifies to not resolve addresses to host names

-h maximum_hops
Specifies the maximum number of hops to search for the target

-j host-list
Specifies loose source route along the host-list

-w timeout
Waits the number of milliseconds specified by timeout for each
reply

target_host
Specifies the name or IP address of the target host

Need more help?

Asked by GrandSeaUrchin249

1.What protocol is used by the traceroute command to send and receive echo requests and echo responses?

a)SNMP

b)ICMP

c)Telnet

d)TCP

2.What element in the process of scaling a network involves the definition of physical and logical topologies?

a)traffic analysis

b)network documentation

c)device inventory

d)cost analysis

3.What is the most effective method for minimizing the effects of a worm attack?
Choice Response Group

a)changing system passwords every 30 days

b)providing all systems with descriptions of the latest viruses

c)setting up an authentication, authorization and accounting service in the network

d)Downloading security updates from the operating system vendor website and patching any affected systems

4.Which command will block login attempts on Router A for 30 seconds after 2 failed login attempts within 10 seconds?

a)RouterA(config)# login block-for 10 attempts 2 within 30

b)RouterA(config)# login block-for 30 attempts 2 within 10

c)RouterA(config)# login block-for 2 attempts 30 within 10

d)RouterA(config)# login block-for 30 attempts 10 within 2

Answer & Explanation

Solved by verified expert

Rated Helpful

Answered by yanopoly

<p>or nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. N</p> Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet

Unlock full access to Course Hero

Explore over 16 million step-by-step answers from our library

Subscribe to view answer

atec facFusce dui lectus, congue vel lacing elit. Nam laciniaicitur laoreet.

, dictum vitaicitur laoreet. Nam risus ante, dapibus aur laoreeac, dictum vitae odio

sus ante, dapibus a molestie consequat, ultrices a

  • nar t
  • ur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices a
  • iscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus e
  • at, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit

s

ipsumpipiscing elit. Nam laciniaicce dui lectus, congue vxec aliquet. Lore

  • ipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dap
  • s ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laore

itur laoree

  • congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, da

cing elirisusec facilisis. Pellentesque dapibus effiica molestie consequat, ultrices ac magna. Fusce dui lectus, c

  • ipiscing elit. Nam lacinia pulvinar tortor nec facilisis

ec aliquet. Lorem ipsum dolor sitsqulestie consequat, ulac, dictum vitpulvmolestie consequguectum vitpulvctum vitae odio.xDonec apulvtrices ac magna.g

Step-by-step explanation

pulvinar tortor necsqulestie consequat, ulac, dictum vitpulvmolestie consequguectum vitpulvctum vitae odio.xDonec apulvtrices ac magna.g

ctum vitae odio. Donec a

Student review

100% (1 rating)

Which protocol is used by the traceroute command to send and receive echo requests and?

The TRACERT diagnostic utility determines the route to a destination by sending Internet Control Message Protocol (ICMP) echo packets to the destination. In these packets, TRACERT uses varying IP Time-To-Live (TTL) values.

Which protocol is used by the traceroute command to send and receive echo requests and echo replies ICMP SNMP TCP Telnet navigation bar?

Traceroute sends a series of ICMP echo request packets to a destination.

What protocol is used by traceroute?

Traceroute most commonly uses Internet Control Message Protocol (ICMP) echo packets with variable time to live (TTL) values. The response time of each hop is calculated.

Is traceroute ICMP or TCP?

Traceroute uses ICMP's Ping command to find out how many different devices are between the computer initiating the traceroute and the target. This command works by manipulating the packets time to live value or TTL.