HANDS-ON ACTIVITY 8C 307
change the size and shape of this window, but it
is not as flexible as a usual window.
2. We will first trace the route from your computers
to two other computers without using the VPN. So
make sure your VPN is not connected.
3. We’ll start by tracing the route from your computer
to a computer on the campus of the site you VPN
into. In my case, I VPN into my university, which
is Indiana University. I can choose to trace the
route to any computer on campus. I’ll choose our
main Web server (www.iu.edu). At the command
prompt, type tracert and the URL of a computer
on your campus.
4. The top half of Figure 8.21 shows the route from
my computer to www.iu.edu. There are 18 hops
and it takes about 35 ms. The first hop does not
report information because this feature is turned
off in the router at my house for security reasons.
You can see that my ISP is Comcast (hop 6). If you
compare this to the tracert at the end of Chapter 5,
you’ll notice that my ISP changed (and thus the
route into the Internet changed) between the time I
wrote Chapter 5 and this chapter; Comcast bought
Insight in my town of Bloomington, Indiana.
5. Now trace the route from your computer to
another computer on the Internet. The bottom of
Figure 8.21 shows the route from my computer to
www.google.com. There are 17 hops, and it takes
about 35 ms. You’ll see that the routes to IU and
Google are the same until step 6, and then they
diverge.
6. Next we want to see what happens when you have
a VPN connection. Start your VPN software and
connect into the VPN gateway at your school.
7. Trace the route from your computer to the same
computer as in step 3. At the command prompt,
type tracert and the URL of a computer on your
campus.
8. The top half of Figure 8.22 shows the route from
my computer to www.iu.edu. There are two hops
and it takes about 35 ms. The VPN is in opera-
tion and is transparent to my networking software,
which thinks it is on the same subnet as the VPN
gateway. Therefore, it thinks there is just one hop
from my computer to the subnet’s gateway, the
VPN gateway. You’ll see that the time is still about
35 ms, so the packet is still traveling the s ame 18
hops to get there; it’s just that the tracert packet is
encapsulated and doesn’t see all the hops through
the VPN tunnel.
9. Now do a tracert to the same computer as you
did in step 5. The bottom of Figure 8.22 shows
the route from my computer to www.google.com.
There are nine hops and it takes about 43 ms. Of
course, the first hop is really 17 hops and 35 ms;
this is again hidden from view. As we explained
in the text, when the VPN is connected, all pack-
ets go from your computer to the VPN gateway
on your campus before being routed to the final
destination. You can see from this figure that this
adds additional hops and time to packets that are
not going to your campus, compared to not using
the VPN. You can also see that once the packets
leave the VPN gateway they are ordinary packets;
they are no longer encrypted and protected from
view.
The VPN provides security only to and from
the VPN gateway on your campus, not beyond
it. Therefore, you should use your VPN if you
have security concerns to and from campus (e.g.,
someone sniffing your packets). But if most of
your work is going to be off campus, then the
VPN increases the time it takes to send and
receive packets, and only provides security pro-
tection over the last section from your computer
to your school’s campus. Using the VPN may not
be worth the additional response time it imposes
on you.
Deliverables
1. What are the routes from your computer to your
campus Web server with and without the VPN?
2. What are the routes from your computer to
www.google.com with and without the VPN?