Unapproved Windows Network Tool

zhaozj2021-02-08  178

Unapproved Windows Network Tools Su Yuyang Zhihong 01-5-23 11:33:06

As the desktop operating system of the Network Age, Windows 98 is more than just the support and embedded free browser IE of various network protocols such as TCP / IP, more than the previous fewer generations of products, but also free browser IE, in Windows. 98 In operating systems, it also integrates complete, powerful network utilities, which can monitor, analyze, maintain, and manage all levels, different aspects of network applications.

Since most of the tools cannot be selected directly in the "Start" menu, these tools are ignored by most ordinary users. As the network tool integrated as an operating system, its quality and reliability are of course more relieved than all kinds of free sharing software online. Users can eliminate complex installation settings, which are convenient and quick to quickly, and avoid online search, download spending time and energy to prevent viral infections.

The method of running these tools is similar to that run a program: you can enter the appropriate program name after the DOS prompt, or you can enter the same command in the "Run" menu in Start.

First, the detection analysis tool

1. IP detection tool ping

The naming of ping originated from the pulse of the submarine sonar detected the target, which reflected back after the pulse was encountered, which also revealed the PING function. If the response is delayed when browsing a web page, the user can test whether the host can arrive by emitting a testistic IP detection package (equivalent to the sound pulse) to the host. At the same time, ping returns a wealth of information, users can learn about the speed of the host and the IP address of the host from this unit.

Format: PING destination address [parameter 1] [parameter 2] [parameter 3]

The destination address refers to the address of the detected host, or both a domain name or an IP address.

parameter:

-T: Continue ping until the user terminates.

-a: Analysis of the host address.

-N value: The number of detection packages, the default is 4.

-L value: Send buffer size.

-f: Sets the disable division package flag.

-I value: package survival time, this value determines the distance of the IP package to spread online.

-v: service type.

Example: In order to save Internet costs, as exercises, you can enter the local address localhost as the detection target at offline.

Ping Localhost or ping 127.0.0.1

The resulting statistics are as follows:

Pinging any [127.0.0.1] with 32 bytes of data:

Reply from 127.0.0.1: bytes = 32 TIME <10MS TTL = 128

Reply from 127.0.0.1: bytes = 32 TIME <10MS TTL = 128

Reply from 127.0.0.1: bytes = 32 TIME <10MS TTL = 128

Reply from 127.0.0.1: bytes = 32 TIME <10MS TTL = 128

Ping statistics for 127.0.0.1:

Packets: Sent = 4, Received = 4, LOST = 0 (0% LOSS),

Approximate Round Trip Times in Milli-Seconds:

Minimum = 0ms, maximum = 0ms, Average = 0ms

The above is statistics such as the number of issues and the number of packages, the package loss rate, the average routing time. The four probes issued were successfully returned, indicating that the opponent host can access, and got the IP address of the other domain name LocalHost: 127.0.0.1.

2. System Monitor

The system monitor can monitor key resources such as networks, memory, disks, processors, and other critical resources, and dynamically display the statistics. Click on the system monitor under the system tool in the attachment.

Select the Add Items menu to add a monitored item. For the Internet, you should add Dial-up Network Adapter, and then select key items such as "CRC Error" to monitor. The network resource project is very detailed, there is a CRC error, timeout error, over-limit error, transmitted total byte, alignment error, buffer overrun, accepted total byte, connection speed, frame per second, each The byte of the second transmitted, the frame accepted per second, the byte accepted per second, unfinished frame, frame error, etc. To monitor the Internet connection quality, key items such as "CRC Error", "Frame Error" are typically selected to determine whether the user telephone line fault or ISP line fault.

3. Network Statistics Tool NetStat

Function: Display protocol statistics and current TCP / IP network connections, users can get very detailed statistics.

Format: NetStat [Parameter 1] [Parameter 2] [Parameter 3]

parameter:

-a: Display all network connections and listening ports.

-e: Display Ethernet statistics.

-n: Displays addresses and ports in digital format.

-p: Displays the specified TCP or UDP protocol connection.

-r: Displays the routing table.

-s: Show statistics for each protocol. The protocol can be TCP, UDP, IP.

Interval: Disconfigure statistics by specifying interval.

Example: As an exercise, you can enter the command: netstat -s, display all the statistics of all protocols as follows:

IP statistics:

Packets received = 104

Received Header Errors = 0

Received Address ErrorS = 0

DataGrams forwarded = 0

Unknown protocols received = 0

Received Packets Discarded = 0

Received Packets Delivered = 104

Output requests = 104

Routing discards = 0

Discarded Output Packets = 0

Output packet no route = 0

Reassembly request = 0

Reassembly surcessful = 0

Reassembly failures = 0

DataGrams SuccessFully Fragrams Success Fragmented = 0

DataGrams Failing Fragmentation = 0

Fragments create = 0

ICMP statistics:

Received Sent

Messages 104 104

Errors 0 0

Destination unreachable 0 0

Time Exceeded 0 0

Parameter Problems 0 0

Source quenchs 0 0

REDIRECTS 0 0

Echos 52 52

Echo replies 52 52

Timestamps 0 0

TimeStamp Replies 0 0 0

Address Masks 0 0

Address Mask Replies 0 0 0

4. Track Routing Tools Tracert (Trace Route)

Function: View the route from the local host to the target host. This is a good tool for understanding the network principles and work processes. By displaying each host address and recirculation from the local host to the target host, you can know how a packet is transmitted to the target on the network. The host, but also analyzes which link that occurs in the network.

There is a field TTL (TIME to Live) in the IP packet to determine the distance that the packet can transmit on the network, typically preset the initial value when issuing a packet. Whenever the data package encounters a host (after a routing), the field value is subjected to one, then send it to the neighboring next host until the value is zero, stop transmission, if the destination is reached within the range of the TTL value, Then send success, otherwise it must be reissued. This prevents one packet from being transmitted online, resulting in network blocking. The Tracert tool obtains the address and round trip time of each host passing by sending a probe package. Format: Tracert [Parameter 1] [Parameter 2] Target Host

parameter:

-d: does not resolve the target host address.

-H: The maximum number of the specified tracking, that is, the maximum number of hosts passed.

-J: Specifies a loose source routing table.

-w: Specifies the timeout time of each response in milliseconds.

转载请注明原文地址:https://www.9cbs.com/read-3275.html

New Post(0)