(the shorter the better), so you can roughly determine the speed of the site.Similarly, the Webmaster's Home ping tool is also good, website: http://ping.chinaz.com/2: Simple method of measuring website speed with tracert commandThe test method is similar to the ping command, except that the ping is changed to tracert www. Your URL. com, tracert is used to detec
) # standby 2 preemptR2 (config-if) # standby 2 track FastEthernet1/0
// The reason is the same as that of R1. Group 1 has a high priority on R1 and group 2 has a high priority on R2. as long as their respective links are up, they can ensure that they are Active.
10. Check HSRP on R1 and find that group 1 is Active and group 2 is Standby, which is correct.
R1 # sh standby brief
Interface Grp Prio P State Active Standby Virtual IPFa0/0.1 1 105 P Active local 192.168.1.2 192.168.1.254Fa0/0.2 2 100
, it passes through 10 nodes because 128-118 = 10. The second server should be Linux, for the same reason as 64-54 = 10.Some people may have some questions, such:
1. Isn't the package likely to go through many paths? Why are the TTL values of the four packages the same?
This is because the path of the package is determined by some optimal selection algorithms. After the network topology is stable for a period of time, the route path of the package will also be relatively stable in a shortest pat
this machine, it passes through 10 nodes because 128-118 = 10. The second server should be Linux, for the same reason as 64-54 = 10.Some people may have some questions, such:1. Isn't the package likely to go through many paths? Why are the TTL values of the four packages the same?This is because the path of the package is determined by some optimal selection algorithms. After the network topology is stable for a period of time, the route path of the package will also be relatively stable in a s
Traceroute command, tracerouteWith traceroute, we can know the path from your computer to the host on the other end of the Internet. Of course, the path for each packet to arrive at the same destination from a certain source may be different, however, most of the time the routes are the same. In linux, traceroute is called tracert in MS Windows. Traceroute sends a small packet to the target device until it returns, to measure how long it takes. Tracer
Internet command is a very interesting thing. Friends who are familiar with the computer network may know that there is a route tracking so, the author is also the beginning of contact, because recently visited some sites particularly slow, asked the network provider to inform the existence of telecommunications network node congestion situation, asked the author to do a route tracking, but the author is also ignorant of this, Behind or with the network business technology to share here, I hope
in most regions and even nationwide. Because the system is distributed, some regions may be accessible and some regions cannot. For example, the homepage of the well-known cloud storage service Dropbox is blocked by IP addresses.
First, we set the Domain Name Server as a foreign server to eliminate the DNS hijacking problem. Then, we can determine whether the domain name of dropbox has been contaminated by DNS:
C: \> nslookup www.dropbox.com 144.223.234.234
DNS request timed out.
Timeout was 2
192.168.0.255 255.255.255.255 192.168.0.163 192.168.0.163 30
2379153 PID: 4a5006a TID: 4bb0076 224.0.0.0 240.0.0.0 192.168.0.163 192.168.0.163 30
2379153 PID: 4a5006a TID: 4bb0076 255.255.255.255.255 255.255.255 192.168.0.163 192.168.0.163 1
2379153 PID: 4a5006a TID: 4bb0076 ================================================= ==============================================
In addition to the print command, route also has the add and delete commands. You can refer to the help of route, so we will n
are generally used to test whether the network is connected)
0Response
13Time cut requests (these two are mainly used for the synchronization clock between two hosts)
14Time cut response
ICMP application example
(1) The ping command uses ICMP to respond to requests and responses. Using the ping command, an ICMP Response Request Packet (including some optional data) will be sent to the target site. If the target site receives the packet, an ICMP response packet must be sent back to the source s
Label: Style Color Io OS use SP data Div on
In Windows, Ping and tracert are used to determine network connectivity. If Ping is used, packet loss rate can be determined. tracert can be used to track routes. in Linux, there is a better network connectivity judgment tool, it can be used with Ping NSLookup tracert to determine network-related features. This comman
port used for POP3 (an email receiving Protocol) is 110, and the port opened for Windows is 139, if there are other unfamiliar ports in the system, they may be used by Trojans. You can use netstat or netstat-a to observe open ports. If the following port is found, it indicates that a trojan program already exists in the system:Port 31337 is the default port of the BackOffice Trojan; port 1999 is the Yai Trojan; port 2140 or 3150 is the port used by the Deep Throat Trojan; trojan programs such a
Routing tracing command details using routing tracing techniques, details RoutingA friend who is familiar with computer networks may know that there is a route tracing. I recently started to get in touch with it. Due to the recent slow access to computer Pepsi networks, ask the network provider to inform the existence of a blockage in the telecom network node and ask the author to perform a route tracking. However, the author also knows nothing about this. I will share it with the network provid
By traceroute we can know what path the information from your computer to the other end of the Internet host is walking. Of course, each time a packet arrives at a similar destination (destination) by a similar starting point (source), the path may be different, but basically the route is the same. A Linux system, which we call Tracertoute, is tracert in MS Windows. Traceroute measures how long it takes to send a small packet to the destination device
Because of the complexity of the domestic carrier network, there may be situations where a particular network (in the case of a user's local network) cannot access Aliyun ECS due to operator problems. You can provide the following information to the Aliyun after sales support assistance analysis.
In order to troubleshoot successfully, you need to shut down both ECS and the local computer firewall, and any security settings that may affect detection.
The test methods are as follows:
Open a com
)
-----------------------------------------------------------------------------------------------------
Workstation 2>tracert 192.168.1.2 (track the route to 192.168.1.2)
Pc>tracert 192.168.1.2
Tracing route to 192.168.1.2 over a maximum of hops:
1 ms, MS, Ms 192.168.2.1
2 ms 156 MS 192.168.1.2
Trace complete.
Workstation 2 Draws the following conclusions through TRACE
other computers, but you usually have to ping each other, followed by the parameter-a
such as: Ping 192.168.0.9 and then arp–a, you can see this IP MAC address
5.Netstat
You can view the status of the network, such as TCP and UDP ports, and so on, often followed by parameters such as –a–e–n–o–p–r–s
6.tracert
How many routers can the trace packets pass through to the destination computer such as: Tracert
(DHCP) and Domain Name System (DNS) settings, use the ipconfig command without parameters to display the IP addresses of all adapters, subnet masks and default gateways, and so on;
3. Netstat command
Typically used to detect network connectivity on each port of the machine
4. Tracert command
The tracert command is a utility that verifies the path to the process master, using commands and simplicity, as l
tables, it is marked before the packet arrives, and then through the IP rule rule, the corresponding packet is routed using the corresponding routing table, finally the routing table information is read, and the packet is sent out of the gateway.(Source: Use IP route, IP rule, iptables to configure Policy routing.) Here is a more detailed example)Here you can see the order of NetFilter processing network packets: Receive network packets, first DNAT, then Anza by the policy, Anza by the policy-s
uses the domain name for access, and the fault still exists.
Troubleshooting
In order to find out the root cause of the problem, I immediately called my colleagues and asked them to visit the test website through ADSL at home. As a result, both the IP address and domain name can be used for normal access. Therefore, the author locates the root cause of the fault on the Local Computer and starts troubleshooting.
Step 1: because the company uses a firewall, PingIP cannot obtain feedback, so I use
5.7 Windows common network commands ping netstat winipcfg/ipconfig tracert route
5.7.1 Ping command• Function – It is a command to check whether the network is unobstructed or the speed of the network connection. – It is an ICMP-based ICMP response request message and a response response message to complete this function. • Command Format ping [-t] [-a] [-N Count] [-l-length] [-f] [-i TTL] [-v TOS] [-R Count] [-s count] [-j-host list] | [-K host
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.