Traceroute command, tracerouteWith traceroute, we can know the path from your computer to the host on the other end of the Internet. Of course, the path for each packet to arrive at the same destination from a certain source may be different,
Ping Command details
Ping can be used to test the computer name and computer ip address, verify the connection with the remote computer, verify the connection to one or more remote computers by sending icmp echo data packets to the computer and
Command for viewing Ubuntu running status
1. route to view and set the route information for Linux 2. ping: network connectivity check example: Ping 192.168.0.1 parameter:-C is used to specify the number of Ping responses. Example: Ping-C 4 192.168.
Original URL: http://www.cnblogs.com/peida/archive/2013/03/07/2947326.htmlBy traceroute we can know what path the information from your computer to the other end of the Internet host is walking. Of course, each time a packet arrives at a similar
The difference between traceroute and tracert
Recently in the view of TCP/IP detailed Volume 1 o'clock was traceroute and tracert command to a small hole, the original two is a difference.
I grabbed the bag under windows, and I couldn't catch the
Traceroute transmits packets with small TTL (time to Live) values. The TTL is an IP header field , which is used to prevent packets from running into endless loops. When a router this handles the packet subtracts one from the packet ' s TTL. The
From: http://blog.csdn.net/goodboy1881/article/details/670761
--------------------------------------------------------1. imcp Protocol Introduction
As mentioned above, the IP protocol is not a reliable protocol. It does not guarantee that data is
I. Overview:
By default, ASA does not respond to TTL exceeded packets, so Traceroute/tracert does not see the ASA device, and Traceroute/tracert cannot traverse the firewall because of firewall policy restrictions.
Two. Basic ideas:
Depending on
Principles of Ping and Traceroute (5)
(Reference) TCP/IP explanation, Volume 1: Protocol
The name "ping" comes from the sonar positioning operation. The purpose is to test whether another host can arrive. The program sends an ICMP echo request
Layer three discovery three layer protocols are: IP and ICMP Protocol (Internet Management Protocol). ICMP is used to implement intenet management, path discovery, network communication, or target host status, and the ICMP protocol is used primarily
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.