What is affected by TTL. TTL - what is it? Appearance and hardware platform

TTL - the lifetime of the data packet in the IP protocol. How does TTL be interested in an ordinary user? Surely, most of you were on this page in order to learn how to get around the restrictions on the distribution of the Internet from the smartphone. TTL control is used by mobile operators to detect traffic unauthorized connected device. From this review, you will learn exactly how the TTL helps the provider to learn about the distribution of the Internet using Wi-Fi or USB and how to inform the greedy operator to the usual subscriber. We will try to intelligibly explain what TTL is and how this value can help subscribers.

The principle of work TTL.

Unfortunately, unlimited mobile Internet without any restrictions today is not provided with any operator. There are tariffs that provide for the absence of speed limits and traffic, but when using the SIM card only in the smartphone. Also cannot be divided by the Internet with other devices. If you enable Wi-Fi access point on your smartphone or connect to a USB laptop, the operator instantly fixes this fact and will take appropriate measures (proposed to pay additionally). Many are perplexed that the technologies allow the provider to calculate the distribution of the Internet. In fact, everything is much easier than it seems. In order not to allow subscribers to share the Internet with other devices, the operator is sufficient to control TTL. For example, if you enable a modem mode on the phone, the TTL from the connected devices will be 1 less than that of the smartphone, which will immediately respond to the provider. Manipulation with TTL allow you to bypass the tenterh restriction.

If you still do not understand what TTL is and what is his principle of work, read the infographics below.

The device works without distribution of the Internet.


IOS and Android devices of TTL devices are 64 by default. If the phone does not distribute the Internet to other devices, all packets go to the operator with the value of TTL \u003d 64.

Device distributes the Internet.

When you try to distribute the Internet using Wi-Fi, Bluetooth or USB to other devices, for example, a laptop and another phone, packets from the distribution device, are still leaving with the value of TTL \u003d 64. Packages from a computer / laptop to a distributing Internet device reach the value of TTL \u003d 128 (value for Windows by default), lose one unit on the distributing device and go to the operator with TTL \u003d 127. Packages from the receiving Internet phone reach a distribution device with TTL \u003d 64 and go to the operator with TTL \u003d 63, losing one unit. For the operator, this means that the subscriber distributes the Internet, as evidenced by packages with three different TTL values. As a result, the provider is making appropriate measures regarding such a subscriber.

Device distributes the Internet with TTL adjustment.

So that the operator does not calculate the fact of the tetter run, it is necessary to change the default TTL device on the distributing Internet device in such a way that packets from other devices when losing a unit from TTL have a value that was specified for the default distribution device. On the above picture, it can be seen that after adjusting the TTL value on the distribution of the Internet phone is 63. iOS and Android devices have TTL \u003d 64, but after passing packets through the distributing device TTL loses a unit and enters the operator with a value of 63. It turns out that the operator does not see Nothing suspicious and subscriber can distribute the Internet without any restrictions and additional charges.

If the receiving Internet device has the default TTL 64, you need to make appropriate changes. For example, if you want to distribute the Internet to a laptop or a computer that has TTL \u003d 128, you need to change it to 64. This scheme allows you to simultaneously distribute the Internet to a computer, as well as iOS and Android devices. If for some reason you cannot change the TTL to the PC, then change the TTL of the distribution device to 127. As a result, the packages will go to the operator with the same value and no suspicion will arise. True, this scheme has a flaw. You will not be able to connect to the Internet iOS and Android device simultaneously with the computer if they have a default TTL 128.

The device distributes the Internet with the adjustment and fixation of TTL.

This scheme is the most convenient. You need to change and fix TTL for any outgoing packages. That is, it is absolutely no important which devices will connect to the Internet. This option will be ideal for those who cannot change TTL on the receiving device, for example, Smart-TV or game consoles. Slot machines for hryvnias The disadvantage of this method is that it is not suitable for all phones.

Conclusion

We hope you understand what TTL is and how the adjustment of this value can be useful for a regular subscriber. We tried to explain everything shortly and accessible. If you have any questions, ask them in the comments and we will try to help you. Recall that this review is intended to make an idea of \u200b\u200bsuch a thing as TTL. As for practical ways to change this value, then all of them are described in a separate article.

Most recently, the flagship device has appeared on our pages - the ASUS wireless router. A distinctive feature of the model was the presence of eight LAN-ports. Such a number of wired interfaces may be required if there are a large number of devices having a wired connection: Stationary computers, network storages and MFPs, video players, and so on. However, so much technology usually happens only in gicks and computer enthusiasts. Eastern users often even four standard wired ports are too much. Today, our network laboratory has fallen on testing a model with two LANs and one WAN interface. ASUS RT-AC53 - Truly budget router.

So, rather begin!

Appearance and hardware platform

The ASUS RT-AC53 wireless router is made in a black plastic housing, the dimensions of which are 320x190x35 mm (excluding antennas), with a mass of only 285 grams. For its work, the device requires an external power supply (supplied) with the following characteristics: 12 V and 1 A.

The top panel matte consisting of two parts. It contains the name of the manufacturer and the basic parameters of the product, as well as the LEDs that display the state of the wired and wireless interfaces of the device, as well as the availability of power.

The side surfaces are not remarkable, here only the ventilation grille is located.

On the bottom panel of the router, you can detect a sticker with a brief information about the model, four rubber legs, two recesses for two more legs, two technological holes for fastening the device to the wall, and also, of course, the ventilation grille.

The rear panel carries three unknown rotary antennas, three Gigabit Ethernet interfaces (one WAN and two LANs), a power connector with the power on / off button, the WPS button and the reset reset button.

Look now inside the case. The hardware filling of the ASUS RT-AC53 wireless router is represented by one green textolite board, the main elements on which are placed on the one hand. The exception is only the Gigadevice 25Q64CSIG flash memory module, the volume of which is 8 MB.

Gigabit Ethernet Wire Switch Functions Here follows the Realtek RTL8367RB chip. The central processor is represented by the MediaTek MT7620A chip operating at a frequency of 580 MHz. We have already met such a processor earlier in ASUS RP-AC52 and RT-AC51U models. RAM functions perform DDR2 WinBond module, the volume of which is 64 MB. Support for a 2.4 GHz wireless range (2T2R) is built into the processor, whereas for the 5 GHz range is used by a separate MediaTek MT7610EN wireless chip.

On this, we complete a quick consideration of the hardware filling of the router and proceed to the study of its software capabilities.

Initial setup and firmware update

When you first connect to the ASUS RT-AC53 wireless router, the user will need to initial device settings. The initial setup itself is extremely simple - you only need to specify the basic settings for connecting to the Internet, set the administrator password, select the operation mode.

The firmware update is traditionally for all ASUS wireless routers and does not require any special knowledge from the user. To change the firmware, you need to contact the "Firmware Update" tab of the "Administration" menu and specify the file containing the new version of the firmware. It is also worth noting that the update can be made in semi-automatic mode, which, naturally, is required to connect to the Internet.

The entire process of updating the firmware usually takes no more than three minutes (excluding the time required to download the firmware from the global network).

Here, in our opinion, it will be appropriate to mention the utilities supplied with the router, because usually the need for them arises precisely during the initial configuration of the device. So, in a set with ASUS RT-AC53, three utilities are distributed: Device Discovery, Firmware Restoration and ASUS Printer Setup. To confess, we do not really understand why Vendor offers to use the ASUS Printer Setup utility, since the RT-AC53 model does not have USB ports.

Using the Device Discovery utility, the user can detect the ASUS RT-AC53 wireless router on its local network.

If a failure occurred during the firmware update process, RT-AC53 goes into recovery mode, identify which by slowly flashing power indicator. Unfortunately, the test wireless router does not have a built-in web server bootloader, so you can restore the firmware either using the Firmware Restoration utility, or manually by unloading the firmware to the device using the TFTP protocol.

It is also worth noting that while in recovery mode, RT-AC53 does not respond to Echo requests for ICMP (Ping).

C: \\\u003e Ping 192.168.1.1
Pinging 192.168.1.1 WITH 32 Bytes of Data:
Request Timed Out.
Request Timed Out.
Request Timed Out.
Request Timed Out.
Ping Statistics for 192.168.1.1:
Packets: Sent \u003d 4, Received \u003d 0, LOST \u003d 4 (100% LOSS),

However, with the restoration of TFTP is not so simple. First, we just tried to pass the file with a new firmware to the router, but unsuccessfully.

C: \\\u003e
Timeout Occurred.
Connect Request Failed.

Then we launched Wireshark and analyze traffic that the test PC and the router exchanged. It turned out that periodically RT-AC53 sends an ARP request for the address 192.168.1.75.

We changed the address on the Test PC at 192.168.1.75/24, after which the transfer of a firmware file was successful. After a few seconds, after receiving the RT-AC53 file, it returned independently using a new firmware.

C: \\\u003e TFTP -I 192.168.1.1 PUT C: \\ RT-AC53_3.0.0.4_380_6038-G76A4AA5.TRX
Transfer Successful: 7475296 Bytes in 2 Second (S), 3737648 bytes / s

On this we are completing the section on firmware updating and initial settings, and go to consideration of the device's web interface capabilities.

Web Interface Overview

Access to the ASUS RT-AC53 Wireless Router Web Interface can be obtained using any modern browser. The device's web interface is traditionally made in gray-black colors and is available for thirteen languages.

We will not describe all the features of the model in detail, but we will stop at the most interesting.

The RT-AC53 model, as well as all other modern ASUS wireless devices, supports the creation of up to three guest networks in each wireless range. The appropriate setting is available in the Guest Network menu item.

Settings responsible for providing service quality are collected in the menu item "Traffic Manager". Here the user can manually limit the data transfer rate for certain nodes, or use the traditional QoS service. Also, using this menu item, you can get a schedule for loading wired and wireless interfaces.

If necessary, limit the time of use of the global network, you should contact the Parental Control menu item.

Wireless network settings collected in the Wireless Network menu item tabs are traditional for most ASUS wireless routers, so we will not stop on them.

The SWITCH CONTROL tab of the Local Network menu item attracted our attention. In addition to the option of inclusion / disconnection of the NAT hardware acceleration, there is an ability to limit the speed of a certain (usually undesirable) traffic.

ASUS RT-AC53 To connect to providers can use static and dynamic IP addresses, as well as the following tunnels: PPTP, L2TP and PPPoE. The corresponding settings are available on the "Connection" tab of the "Internet" menu. Perhaps a few words here should be said about the options "Expand the value of TTL" and "replace the LAN TTL value". Both options are designed to simplify the user's work in the networks of operators restricting subscribers by the number of connected devices. The "Create LAN TTL value" option allows you to send packets to the Internet with a fixed value of the TTL field in the IP packet header, whereas the "Expand TTL value" option affects the traffic in the opposite direction, allowing you to not discard those packages, the TTL of which should have been reset when pass through the router.

Unfortunately, the DUAL WAN function of the RT-AC53 model is not supported.

The IPv6 protocol operation settings are collected in the menu item of the menu.

The ASUS RT-AC53 wireless router has a built-in VPN client and server. Unlike the older models, the OpenVPN support is missing here.

Traffic filtering is performed using the "Firewall" menu tab.

The selection of the device mode is selected using the "Administration" menu item.

On this, we complete a quick overview of the main features of the device's web interface and go to the command line interface.

Command line interface

Controlling the command line of the device is made using the "System" tab of the "Administration" menu. It is worth noting that access is supported by both the Telnet and SSH protocol.

To access the command prompt, the same pair is a login password as to access the router's web interface. The firmware of the tested model is based on the Linux 2.6.36 operating system using BusyBox 1.17.4.

RT-AC53 Login: Admin
Password:
[Email Protected]: / TMP / Home / Root # CD /
[Email Protected]: / # Uname -a
Linux RT-AC53 2.6.36 # 1 FRI SEP 23 12:05:55 CST 2016 MIPS GNU / Linux
[Email Protected]: / # busybox
BusyBox v1.17.4 (2016-09-23 12:02:33 CST) Multi-Call Binary.
Copyright (C) 1998-2009 Erik Andersen, Rob Landley, Denys Vlasenko
aND OTHERS. Licensed under GPLV2.
See Source Distribution for Full Notice.
Usage: BusyBox ...
OR: FUNCTION ...
BusyBox IS A Multi-Call Binary That Combines Many Common Unix
Utilities INTO A SINGLE EXECUTABLE. MOST PEOPLE WILL CREATE A
Link to BusyBox for Each Function The And BusyBox
Will Act Like Whatever IT Was Invoked AS.
Currently Defined Functions:
[, [, ARP, ASH, AWK, CAT, CHMOD, CHOWN, CHPASSWD, CMP, CP, CROND, CUT, DATE, DD, DF,
Dirname, Dmesg, Echo, Egrep, Env, Ether-Wake, Expr, FGrep, Find, Free, Grep, Gunzip,
IFCONFIG, INSMOD, IONICE, KILL, KILLALL, KLOGD, LN, LOGGER, LOGIN, LS, LSMOD, MD5SUM,
MDEV, Mkdir, Mknod, Modprobe, More, Mount, MV, Netstat, Nice, Nohup, Nslookup, Pidof,
Ping, Ping6, Printf, PS, PWD, Readlink, Renice, RM, Rmdir, RMMOD, Route, Sed, SH, Sleep,
Sort, Strings, Sync, Syslogd, Tar, Telnetd, Test, Top, Touch, TR, TRACEROUTE, TRACEROUTE6,
UDHCPC, Umount, Uname, Uptime, Usleep, Vconfig, VI, Watch, WC, Which, Zcat, Zcip

Using the PS command, let's see which processes are running on the device at the moment. Top utility Displays data on the current operation of running processes. The results of the work of the specified utilities we placed in a separate file.

Content directory / bin, / sbin, / usr / bin and / usr / sbin, along with the sysinfo script output, we present in a separate file. For example, in the / sbin directory there is a TCPCheck utility that allows you to check whether a specific TCP port on a specific node is open.

[Email Protected]: / # tcpcheck
usage: TcpCheck.
[Email Protected]: / # TCPCheck 10 192.168.1.1:23
192.168.1.1:23 is alive.
[Email Protected]: / # TCPCheck 10 192.168.1.2:23
192.168.1.2:23 Failed.

Let us now go to the / proc directory and see which files are posted here, as well as find out the operating system operation time and its average load, we obtain information about the installed processor and the number of RAM. In principle, the operation time and mode of the system can also be obtained using the UPTime system call.

[Email Protected]: / # CD / PROC
[Email Protected]: / Proc # Ls
1 193 267 BUS KPAGECOUNT STAT
10 194 3 CMDLINE KPAGEFLAGS SYS
11 196 30 CPUINFO LOADAVG SYSRQ-TRIGGER
115 2 301 Crypto Locks Sysvipc
116 20 306 Devices Meminfo Timer_List
12 201 4 Diskstats Misc Tty
13 204 41 DRIVER MODULES UPTIME
135 208 430 EXECDOMAINS MOUNTS VERSION
136 21 5 FileSystems MT7620 Vmallocinfo
164 212 6 FS MTD VMSTAT
17 22 7 INTERRUPTS NET ZONEINFO
172 226 76 IOMEM NVRAM
175 23 8 IOPORTS PAGETYPEINFO
18 261 82 IRQ Partitions
180 263 9 KCORE SELF
19 265 BuddyInfo KMSG Softirqs
[Email Protected]: / Proc # Cat Uptime
1746.00 1673.66
[Email Protected]: / proc # cat loadavg
0.07 0.07 0.02 1/47 432
[Email Protected]: / Proc # Cat Cpuinfo
sYSTEM TYPE: MT7620
processor: 0.
cPU Model: MIPS 24KC V5.0
Bogomips: 386.04
wait Instruction: Yes
microSecond Timers: Yes
tLB_ENTRIES: 32.
extra Interrupt Vector: Yes
hardware Watchpoint: Yes, Count: 4, Address / IRW Mask:
ASES IMPLEMENTED: MIPS16 DSP
shadow Register Sets: 1
core: 0.
VCED Exceptions: Not Available
Vcei Exceptions: Not Available
[Email Protected]: / Proc # uptime
03:29:19 Up 29 Min, Load Average: 0.05, 0.06, 0.02

It is impossible not to mention the NVRAM utility that allows you to change the important parameters of the device.

[Email Protected]: / # NVRAM
usage: NVRAM
[Email Protected]: / # NVRAM Show | Grep Admin.

http_username \u003d admin.
[Email Protected]: / # NVRAM Show | GREP PASSWORD.
size: 20283 bytes (41157 Left)
http_passwd \u003d password.
[Email Protected]:/#

For example, using the NVRAM utility, you can disable the STP protocol on the RT-AC53 LAN ports.

[Email Protected]: / # NVRAM Show | Grep Stp.
size: 20283 bytes (41157 Left)
lAN_STP \u003d 1.
lAN1_STP \u003d 1.
[Email Protected]: / # nvram set lan_stp \u003d 0
[Email Protected]: / # NVRAM Commit
[Email Protected]: / # NVRAM Show | Grep Stp.
size: 20283 bytes (41157 Left)
lAN_STP \u003d 0.
lAN1_STP \u003d 1.
[Email Protected]:/#

This consideration of the capabilities of the command line interface is completed, let us turn to the testing of the device.

Testing

The first test from which we are traditionally starting this section is to measure the loading time of the router, under which we understand the time interval between the power of the power supply to the device before receiving the first echo response via the ICMP protocol. The ASUS RT-AC53 wireless router is loaded in 42 seconds, we consider it a good result.

The second equally traditional test was checking the security of the device carried out by the LAN port using the Network Security Scanner Positive Technologies XSpider 7.8. A total of nine open ports were found. The most interesting detected information is presented below.

Before you directly go to load testing, we would like to introduce the reader with the main parameters of our test stand.

Component PC Notebook
Motherboard ASUS MAXIMUS VIII EXTREME ASUS M60J.
CPU Intel Core i7 6700K 4 GHz Intel Core i7 720qm 1.6 GHz
RAM DDR4-2133 SAMSUNG 64 GB DDR3 PC3-10700 SEC 16 GB
LAN card Intel Pro / 1000 PT
ASUS PCE-AC88
ATHEROS AR8131.
ASUS RT-AC88U
Operating system Windows 7 x64 SP1 Rus Windows 7 x64 SP1 Rus

Start device performance tests We decided with measuring the routing speed with NAT / PAT with a hardware acceleration (default setting). Measurements were carried out for one, five and fifteen simultaneous TCP connections. The test results are presented in the diagram below.

As follows from the results of this test, the routing is performed at the velocity of the medium, the processor of the device remains not loaded. The only thing that I would like to note is the restriction when working in full duplex: the total data transfer rate in both directions does not exceed 1 Gbit / s, which, in our opinion, is associated with the internal wiring of the device.

We decided to turn off the hardware acceleration and repeat the previous dimensions. The speed limit in this test is due to the performance of the central processor of the router.

When performing classical routing without NAT, the hardware acceleration is not used, therefore the speed resulting from the experiment is similar to those that we received in the previous experience.

For residents of the post-Soviet space, the actual way to connect to the Internet is the use of a variety of tunnels (VPN). We decided to measure the performance of the wireless router when working with two types of such tunnels: PPTP and L2TP. ASUS RT-AC53 supports both encrypted (MPPE128) and non-fired PPTP tunnels.

We decided to continue wired tests. We decided to measure the performance of the ASUS RT-AC53 model when working with the next version of the IPV6 protocol.

IPv6 package processing is performed by the central processor, so the speed limit is due to the performance of the latter, that is, when transmitting IPv6 traffic at a speed of about 200 Mb / s, the processor load was 100%.

The ASUS RT-AC53 wireless router has the ability to ensure the quality of transmitted traffic. For example, you can configure the maximum bandwidth limiting available to a specific device. We decided to figure out how much the real speed of the user data is configured. The graph below shows three curves: the blue corresponds to the configured values, green - traffic transmitted from the subscriber to the Internet, and the Red - in the opposite direction.

For speeds of about 150 Mbps, the obtained values \u200b\u200bare not bad correspond to configured, but starting with this speed, the growth of the bandwidth accessible is terminated, which is again due to the performance of the central processor of the device - to support QoS support CPUs. All devices for which the speed limit rule is not configured when the QoS is enabled, a strip is obtained about 175 Mbps. It is worth noting that we do not consider the restrictions found by the problem, since the use of QoS mechanisms is usually required at relatively low access speeds to the global network, and most providers in Russia do not offer tariffs at a speed above 100 Mbps.

QoS security mechanisms are not the only means to limit the speed of traffic transmitted by users. We are talking about the settings located in the "SWITCH CONTROL" tab of the Local Network menu item. True, it is worth talking here, rather, about protective mechanisms to stabilize the work of the network in cases where, for example, a network card of one of the PC filed and sends a large number of erroneous frames. We could not not test the work of this mechanism on the example of the Unknown Unicast limitations. Measurements were carried out to 700 Mbps speeds - the restriction mechanism perfectly coped with the traffic generated by our test PC. It seems that such Storm Control in the RT-AC53 model is implemented hardware. Here, however, it is impossible not to say about a spoon of the game, which we found in the testing process. If you set restrictions quite large, then traffic, the recipient of which is not known, at a speed of about 500 Mbit / s will lead to 100% of the processor load, so we extremely not recommended users to change default values.

Finally, we got to wireless tests. The measurements were carried out at the location of the router and the client in close proximity to each other, the distance between them was from one to three meters. At first we found out what speeds will be available to users operating in the 2.4 GHz band.

The next test was the measurement of the velocities of the wireless transmission of user data in the 5 GHz band. The range of 5 GHz continues to remain less damaged compared to the 2.4 GHz range, so we, as always, we recommend that users pay their closest attention to it.

In conclusion of this section, we decided to find out to which maximum temperature the case of the device is heated with intensive use. The temperature of the ASUS RT-AC53 wireless router housing is measured using our ADA TEMPPRO-2200 laboratory pyrometer. The maximum value is the following: the top panel - 37 ° C, the lower panel - 41 ° C. During measurements, the temperature in the room was 25 ° C.

On this we finish the testing section and go to summarize.

Conclusion

We were satisfied with the tested ASUS RT-AC53 wireless router. This model refers to the class of budget decisions: do not expect record speeds or maximum set of functions. However, most home users of the functionality of RT-AC53 will be more than enough. To connect to the Internet of one stationary computer, the television console and several laptops with phones, it is not required to purchase a network monster, a fairly ordinary inexpensive wireless router. The ASUS RT-AC53 model is such a solution - nothing superfluous, only everything you need.

The strengths of the ASUS RT-AC53 wireless router are listed below:

  • good traffic transmission rates in both wireless ranges;
  • availability of QoS security mechanisms;
  • support for up to three guest networks in each wireless range;
  • good speed processing speeds IPv6-traffic;
  • the ability to limit the time of use of the Internet by the client (parental control);
  • the presence of a built-in PPTP client and server;
  • the ability to limit the speed of transmission of undesirable traffic in LAN;
  • acceptable price.

Unfortunately, we cannot not list the disadvantages of the device:

  • the web interface is not fully translated;
  • total two LAN ports.

At the time of writing this review, the average price for the ASUS RT-AC53 wireless router in Moscow's online stores was 3,700 rubles.

Probably many of us paid attention to the TTL parameter in the running Ping command. TTL is decrypted Time To Live..

Package lifetime is the limit number of iterations that the data packet can make it disappearance. I am not so officially expressed, TTL is the number of "jumps" from the device to a device that can accomplish the package.

Strictly speaking, TTL is not only about data packets. Other things, for example, DNS records on servers have time. Therefore, do not bind the concept of TTL only with data packages.

Returning to the topic of the article, explain the purpose of the lifetime of the package. The fact is that data on the network has a property that creates a kind of "trash can" traffic. Since the number of "jumps" between the nodes in the packages is limited, they will not be able to "wander" on the network forever.

In fact, it was originally assumed that TTL packages will be measured in seconds. So it should have been time in the literal sense of the word. However, later from this concept, they refused to favor a simple number of "jumps" or hops (HOP). On each intermediate node, this number decreases per unit (by default, although the settings can be exposed otherwise). If the number of "jumps" from the package has expired, and he never reached the addressee, this package is destroyed, and the addressee is sent a message about the need to re-send data ( Time Exceeded). Note that the switches remaining the number of "jumps" do not change, as they act on a channel level (lower), not by network.

The package lifetime is set in the corresponding field in the IPv4 packet header. The IPv6 standard uses another Hop Limit field. The maximum possible value of TTL is 255. In most popular operating systems (MacOS, Linux, Android, iOS, etc.) TTL \u003d 64. In Windows default TTL \u003d 128.

TTL and Internet providers

It is quite interesting to use TTL packages Internet providers to detect unauthorized connection of devices. The method is massively used with the distribution time of mobile Internet and devices that can not only consume this Internet, but also to distribute other (smartphones, tablets).

What does it look in practice? If you use the mobile Internet from the smartphone, then it sends TTL \u003d 64, but if you distribute Wi-Fi from it, the TTL connected devices will be changed by one. Vividly can be traced in the diagram below.


Change TTL when distributing Wi-Fi from a smartphone.

Thus, the operator sees that TTL "jumps" from 64 to 63, or even up to 127 (if it is a laptop with Windows), and concludes that there is no single device, but more. Depending on the provision of communication, it can lead to blocking.

We will not consider ways to bypass blockages in this article. Let's just say that the default TTL value can be changed. Take for example Windows. If you run Ping Localhost, you will see that, as mentioned earlier, TTL \u003d 128.

To change the default TTL values, we need to open the registry editor, go into the branch HKEY_LOCAL_MACHINE \\ SYSTEM \\ CURRENTCONTROLSET \\ SERVICES \\ TCPIP \\ PARAMETERS and edit (or create if it is not) parameter Defaultttl.. If you have a 64-bit version of the OS, the type of parameter will be Qword (64 Bit)if the 32-bit version of the OS, then type DWORD (32 bits). The calculus system is decimal, and the value can be set from 1 to 255. For example, 65. Then the data packets passing through the smartphone by sinking a Wi-Fi will produce TTL \u003d 64.

Changing the TTL value in Windows.

After that restart the computer. Running Ping Localhost again, you can see that the value of TTL has changed.

TTL value is the time of the data set in the IP protocol. Many customers of networks went to this section to learn how to eliminate restrictions on the distribution of traffic from the smartphone. After all, thanks to this indicator, mobile operators have the ability to control the distribution of traffic from smartphones via Wi-Fi or other way to devices. They always know where the Internet is heard. In this review, we will try to set out the material as much as possible.

Recently, all mobile operators provide unlimited Internet without restrictions only if you use the Internet on the smartphone. But if you start using a smartphone instead of an access point, or connect the laptop on the wire, then the cellular company will quickly detect (will offer to pay the traffic). Most users do not understand how it happens. But there is nothing complicated. To check the company use TTL. This means Timetolive, the time of existence of data in seconds. The greatest value is 255. Moreover, different operating systems generate sets with different values. For example, companies instantly introduce restrictions as soon as you start distributing traffic to other devices. When a new device is connected, the outgoing TTL will be less than that of your smartphone per unit. Knowing how to change this value, you can bypass these limitations.

Types of TTL.

For different TTL systems, it has a different meaning. TTL \u003d 1, if it is not transmitted through other devices. The greatest value is 255. It takes a different value depending on OC:

  • Windows (XP, 7,8,10) TTL \u003d 128
  • UNIX TTL \u003d 64
  • iOS TTL \u003d 64
  • Android TTL \u003d 64
  • Lumia TTL \u003d 130
  • Mac OS TTL \u003d 64 (see Unix)
  • Cisco TTL \u003d 255

If there are still questions, then we will try to schematically explain what TTL is.

Mobile gadget work without distribution

If the smartphone does not work instead of access point, the operator receives the value of 64.

Smartphone distributes traffic without correcting TTL

When traffic is distributed through wireless networks or USB, on a laptop and another smartphone, the operator receives sets from the distribution device with three different TTL values: 64 from itself, 127 from the computer and 63 from the receiving device. This is due to the fact that TTL passing through the sinking device, loses a unit from its value. As a result, the mobile provider takes measures to such a subscriber.

You can: crawl restrictions:

  1. Change the value on the receiving device.
  2. Secure the value on the distributing device.

Distribution of traffic with TTL adjustment

To exclude the operator's blocking, you need to change this value that is installed on the distributing device. The diagram shows how the value changed the value. Now this value, from the receiving device, passing through the distribution device, decreases by one unit and becomes 63 instead of 64. The operator does not notice changes in traffic and does not introduce restrictions.

If the receiving machine has an excellent TTL value, then it is necessary to change the set value from 128 to 64. If you cannot make changes on your computer, then change the value on the distributing device to 127. Then the operator will also receive a TTL with an equal value. But in this case you will not be able to distribute the Internet at the same time on the phone and laptop, because They have a different meaning.

Conclusion

In this article we tried to state the material as simple as possible and understandable. Now you know what the value of TTL is and how the mobile operators can be obtained using its change. With specific methods for adjusting the value on MTS, you can find in a separate one.

mOB_INFO.