Some useful network commands in DOS _ PHP Tutorial

Source: Internet
Author: User
Tags ftp commands name database
Some useful network commands in DOS. Common Network-related commands in DOS explain Arp display and modify the physical address translation table of the IP address used by the "IP Address Resolution Protocol" (ARP) to the Ethernet or the ring. This command only has common network-related commands installed in DOS to explain Arp display and modify the Address Resolution Protocol (ARP) to the Ethernet IP address or the physical address translation table of the ring. This command is available only after TCP/IP negotiation is installed. Arp-a [inet_addr] [-N] [if_addr] arp-d inet_addr [if_addr] arp-s inet_addr ether_addr [if_addr] parameter-a displays the current ARP through querying TCP/IP. If inet_addr is specified, only the IP address and physical address of the specified computer are displayed. -G is the same as-. Inet_addr: specify the IP address in decimal format. -N: displays the ARP entries on the network interface specified by if_addr. If_addr specifies the IP address (if any) of the address translation table interface to be modified ). If it does not exist, the first applicable interface will be used. -D: delete the items specified by inet_addr. -S adds an entry in the ARP cache to associate the IP address inet_addr with the physical address ether_addr. The physical address is given by six hexadecimal bytes separated by a hyphen. Specify the IP address using the dotted decimal mark. Items are permanent, that is, items are automatically deleted from the cache after the timeout expires. Ether_addr specifies the physical address. Finger displays user information on the specified system that runs the Finger service. Different variables are output based on the remote system. This command is available only after TCP/IP negotiation is installed. Finger [-l] [user] @ computer [...] parameter-l displays information in the long list format. User specifies the user to obtain the relevant information. The user parameter is omitted to display information of all users on the specified computer: @ computer Ftp transfers files to a remote computer running the FTP service or from a remote computer running the FTP service (sometimes called daemon ). Ftp can be used for interaction. Click "ftp command" in the "Related topics" list to obtain the available "ftp" sub-command description. This command is only available after the TCP/IP protocol is installed. Ftp is a service. once started, it will be created in a sub-environment where ftp commands can be used. by typing the quit sub-command, you can return the sub-environment to the Windows 2000 command prompt. When the ftp sub-environment is running, it is represented by an ftp command prompt. Ftp [-v] [-n] [-I] [-d] [-g] [-s: filename] [-a] [-w: windowsize] the [computer] parameter-v prohibits the display of remote server responses. -N disable automatic logon to the initial connection. -I disable the interaction prompt when multiple files are transferred. -D enable debugging and display all ftp Commands passed between the client and the server. -G disables a file name group. it allows wildcard characters (* and?) to be used in local files and pathnames ?). (See glob command in "Command Reference .) -S: filename specifies the text file containing ftp commands. When ftp is started, these commands will automatically run. Spaces are not allowed in this parameter. Use this switch instead of resetting (> ). -A uses any local interface when bundling data connections. -W: windowsize replaces the transfer buffer with a default size of 4096. Computer specifies the name or IP address of the computer to connect to the remote computer. If specified, the computer must be the last parameter of the row. Nbtstat this diagnostic command uses NBT (NetBIOS on TCP/IP) to display protocol statistics and current TCP/IP connections. This command is only available after the TCP/IP protocol is installed. Nbtstat [-a remotename] [-a ip address] [-c] [-n] [-R] [-r] [-S] [-s] [interval] Parameters -a remotename: used the name of the remote computer to list its name table. -IP address A uses the IP address of the remote computer and lists the name tables. -C. specify the IP address of each name and list the content cached by NetBIOS name. -N: list the local NetBIOS names. "Registered" indicates that the name has been registered by broadcast (Bnode) or WINS (other node types. -R clears all names in the NetBIOS name cache and reloads the Lmhosts file. -R lists the name resolution statistics for Windows network name resolution. On a Windows 2000 computer where WINS is configured, this option returns the number of names to be resolved and registered through broadcast or WINS. -S: displays client and server sessions, and lists remote computers only through IP addresses. -S: displays client and server sessions. Try to convert the IP address of the remote computer to the name of the host file. Interval re-displays the selected statistics. interval seconds are paused between each display. Press CTRL + C to stop displaying statistics again. If this parameter is omitted, nbtstat prints the current configuration information once. Netstat displays protocol statistics and current TCP/IP network connections. This command can be used only after the TCP/IP protocol is installed. Netstat [-a] [-e] [-n] [-s] [-p protocol] [-r] [interval] parameter-a shows all the connection and listening ports. Server connections are usually not displayed. -E displays Ethernet statistics. This parameter can be used with the-s option. -N: the address and port number are displayed in numeric format (instead of trying to find the name ). -S displays statistics for each protocol. By default, statistics on TCP, UDP, ICMP, and IP are displayed. The-p option can be used to specify the default subset. -P protocol indicates the connection of the protocol specified by protocol. protocol can be tcp or udp. If you use the-s option together to display statistics for each protocol, the protocol can be tcp, udp, icmp, or ip. -R displays the content of the route table. Interval re-displays the selected statistics and pauses interval seconds between each display. Press CTRL + B to stop resending statistics. If this parameter is omitted, netstat prints the current configuration information once. Ping to verify the connection to the remote computer. This command can be used only after the TCP/IP protocol is installed. Ping [-t] [-a] [-n count] [-l length] [-f] [-I ttl] [-v tos] [-r count] [- s count] [] [-j computer-list] | [-k computer-list] [-w timeout] destination-list parameter-t Ping the specified computer until it is interrupted. -A resolves the address to the computer name. -N count: Number of ECHO data packets specified by count. The default value is 4. -L length sends the ECHO data packet containing the data volume specified by length. The default value is 32 bytes. The maximum value is 65,527. -F sends the "do not segment" flag in the data packet. Packets are not segmented by the Gateway on the route. -I ttl: Set the ttl field to the value specified by ttl. -V tos: set the "service type" field to the value specified by tos. -R count records the routes of outgoing and returned packets in the "record route" field. Count can specify at least one computer and a maximum of nine computers. -S count specifies the timestamp of the number of hops specified by count. -J computer-list uses the computer list specified by computer-list to route data packets. The maximum number of consecutive computers that can be separated by the Intermediate Gateway (routing sparse source) IP addresses is 9. -K computer-list uses the computer list specified by computer-list to route data packets. The maximum number of IP addresses allowed by consecutive computers to be separated by intermediate gateways (strictly Source routes) is 9. -W timeout specifies the timeout interval, in milliseconds. Destination-list specifies the remote computer to be pinged. Rcp copies files between Windows 2000 computers and systems running Remote Shell port monitoring program rshd. The rcp command is a connection command. when a command is issued from a Windows 2000 computer, it can also be used for other transfers to copy files between two computers running rshd. Rshd port monitoring programs can be used on UNIX computers, but cannot be used on Windows 2000. Therefore, Windows 2000 computers can only serve as system parameters for issuing commands. The remote computer must also provide the rcp utility by running rshd. Rcp [-a |-B] [-h] [-r] source1 source2... sourceN destination parameter-a specifies the ASCII transmission mode. In this mode, the carriage return/line break is converted into a carriage return/line break in an output file. This mode is the default transmission mode. -B specifies the binary image transmission mode. The carriage return/line feed conversion is not executed. -H transfers the source files marked as hidden properties on Windows 2000 computers. If this option is not available, the effect of hiding a file on the rcp command line is not the same as that of the file. -R recursively copies all subdirectories of the source to the target. Both source and destination must be directories. even if the source is not a directory, you can use-r to work. But there will be no recursion. The format of source and destination must be [computer] [. user]:] filename. If the [computer] [. user]:] section is ignored, the computer is assumed to be a local computer. If the [. user] section is omitted, the currently logged on Windows 2000 user name will be used. If a fully qualified computer name is used, which contains a period (.) delimiter, it must contain [. user]. Otherwise, the last part of the computer name will be interpreted as the user name. If multiple source files are specified, destination must be a directory. If the file name is not followed by a UNIX forward slash (/) or a Windows 2000 system backslash (), it is assumed that the file name is relative to the current working directory. In Windows 2000, this is the directory for issuing commands. In the remote system, this is the logon Directory of the remote user. The period (.) indicates the current directory. Use escape characters (, ", or) in the remote path to use wildcards in the remote computer. Rexec runs commands on a remote computer that runs the REXEC service. The rexec command verifies the user name on the remote computer before executing the Specified Command. the command can be used only after the TCP/IP protocol is installed. Rexec computer [-l username] [-n] The command parameter computer specifies the remote computer on which the command is to be run. -L username specifies the user name on the remote computer. -N redirects the rexec input to NULL. Command specifies the command to run. Route controls the network Route table. This command can be used only after the TCP/IP protocol is installed. Route [-f] [-p] [command] [destination] [mask subnetmask] [gateway] [metric costmetric] parameter-f clears the route tables of all gateway entries. If this parameter is used in combination with a command, the route table is cleared before running the command. -P when this parameter is used with the add command, the route will persist between the system boot program. By default, the route is not retained when the system restarts. When used with the print command, a list of registered persistent routes is displayed. Ignore all other commands that always affect the corresponding persistent routing. Command specifies the following command. Command purpose print route add route delete route change existing route destination specify send command computer. The mask subnetmask specifies the subnet mask associated with the route entry. If this parameter is not specified, 255.255.255.255 is used. Gateway. The network database file named Networks and the computer name database file named Hosts both reference the names of all destinations or gateways. If the command is print or delete, the target and Gateway can also use wildcards or omit the Gateway parameter. Metric costmetric assigns an integer number of hops (from 1 to 9999) to be used when calculating the fastest, most reliable, and (or) cheapest route. Rsh runs commands on the remote computer that runs the RSH service. This command can be used only after the TCP/IP protocol is installed. Rsh computer [-l username] [-n] The command parameter computer specifies the remote computer that runs the command. -L username indicates the user name used on the remote computer. If this parameter is omitted, log on

Arp displays and modifies the physical address translation table of the IP address used by the IP Address Resolution Protocol (ARP) to the Ethernet or the ring. This command is only installed on...

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.