When you open your browser, when you are free to travel in the Internet world of Hao Rhai, is it addicted to various utility software? Among them, a large part is the network tool! But please don't ignore your front -windows (including Win98 and NT), there are many network utilities, which is relatively simple, but is not simple.
Ping
Ping is a utility that is extremely high, used to determine if the local host exchanges (send and receives) datagrams with another host. According to the information returned, you can infer whether the TCP / IP parameter is set correctly and if it is running. It should be noted that the TCP / IP configuration is correct if the TCP / IP configuration is successful, and you must perform a large number of local hosts and remote hosting data reports to be sure that TCP / The correctness of IP.
Simply put, ping is a test program. If ping is running correctly, you can rule out the network access layer, NIC, MODEM input and output lines, cables, and routers, etc., thereby reducing the scope of the problem. However, since the size of the issued datagram and endless high-speed transmission can be customized, Ping is also used as a tool with some people as a DDOS (reject service attack) tool, the front time Yahoo is a hacker with hundreds of high-speed access The Internet's computer continuously sends a large amount of PING datagram.
Follow the default settings, the ping command running on Windows sends 4 ICMP (Internet Control Packet Protocol) to return the request, each 32-byte data, if everything is normal, you should get 4 reply answers.
Ping can display the time quantity between the sending feedback request to returns the return response in milliseconds. If the response is short, it means that the datagram does not have to pass too much router or network connection speed. Ping can also display TTL (Time
TO
Live existence time) Value, you can calculate the packet through the TTL value has passed how many routers have passed: the source point TTL start value (which is the multiplication number of one 2 that returns a slightly larger number) - returns the TTL value. For example, returning a TTL value of 119, then it is possible to estimate the TTL start value of 128, and the source location to the target location to pass 9 router network segments (128-119); if the TTL value is 246, The TTL start value is 256, and the source location to the target location to pass 9 router network segments.
Typical order of network failures through ping
Normally, when you use the ping command to find the problem or verify the network operation, you need to use many ping commands, if all are running correctly, you can believe that the basic connectivity and configuration parameters are no problem; if some The ping command runs a fault, which can also indicate where to find the problem. A typical detection order and corresponding possible faults are given below:
ping
127.0.0.1 - This ping command is sent to the IP software of the local computer, which never exits the computer. If this does not do this, it means that there is some most basic issues for the installation or running of TCP / IP.
ping
This command is sent to the IP address configured by your computer, and your computer should always make a response to the ping command. If not, there is a problem with the local configuration or installation. This issue occurs, LAN users disconnect the network cable and resend the command. If the network is turned off, this command is correct, then another computer may have the same IP address.
ping
Other IPs in the LAN - this command should leave your computer, reach other computers through the NIC and network cable, return. Received a return response indicates that the NIC and the carrier in the local network operate correctly. But if you receive 0 feedback answers, then the subnet mask (when subnet split, the network part of the IP address and the host part) is incorrect or the network card configuration error or the cable system has problems. Ping Gateway IP - This command If the answer is correct, it indicates that the gateway router in the LAN is running and can make a response.
ping
Remote IP - If you receive 4 answers, it means that the successful use of the default gateway. For dial-up users, they represent the accessible Internet (but do not rule out the ISP DNS).
ping
Localhost - localhost is a network reservation name of a system, which is an alias of 127.0.0.1, and each computer should be able to convert the name into this address. If there is no such band, there is a problem in the host file (/ windows / host).
ping
Www.yahoo.com - Execute the PIN ... address for this domain name, usually through the DNS server
If there is a failure here, the IP address of the DNS server is incorrect or the DNS server is fault (for dial-up users, some ISPs do not need to set up DNS servers). By the way: You can also use this command to implement the switching function of the domain name on the IP address.
If all the ping commands listed above can run normally, then you can rest assured that you can make local and remote communications on your computer. However, the success of these commands does not mean that all your network configurations are no problem, for example, some subnet mask errors may not be detected by these methods.
Common Parameter Options for Ping Commands
PING IP -T - Continuously performs the ping command until the user is interrupted by the user in Ctrl C.
Ping IP -L 2000 - Specifies the length of the data in the ping command to 2000 bytes instead of the default 32 bytes.
PING IP -N - Performs a ping command for a specific number of times.
Netstat
NetStat is used to display statistics associated with IP, TCP, UDP, and ICMP protocols, generally used to verify network connectivity of each port of this unit.
If your computer is sometimes accepted, you don't have to feel strange, TCP / IP can allow these types of errors and can automatically return the datagram. However, if the number of accumulated errors accounts for a considerable percentage of the received IP datagram, or its number is rapidly increased, then you should use NetStat to check why these situations.
Some common options for NetStat:
Netstat
-s-- This option can display its statistics in accordance with each protocol. If your application (such as a web browser) runs slower, or if you cannot display data such as the web page, you can use this option to see the information displayed. You need to carefully check the rows of statistics, find the keywords of the error, and then determine the problem.
Netstat
-e-- This option is used to display statistics about Ethernet. It lists the items that include the total number of bytes of the transmitted datagram, the number of errors, the number of deletions, the number of datagrams, and the number of broadcasts. These statistics have both transmitted data reports, as well as the number of received data. This option can be used to count some basic network traffic).
NetStat -R-- This option can display information about the routing table, similar to the following Route print commands
information. In addition to displaying valid routing, it also displays currently valid connections.
Netstat
-A - This option displays a list of all valid connection information, including ESTABLISHED, and those connectors of the Listen Connection request. NetStat -N - Displays all established effective connections.
NetStat's wonderful
People who often internet access usually use ICQ. I don't know if you are harassing by some harsing people, I don't dare to go online, I want to complaint but I don't know and start? In fact, you only need to know the IP of the other party, you can complain to the ISP of him. But how can I know the other's IP through ICQ? If the other party selects the IP address when setting ICQ, you can't see it in the information bar. In fact, you can easily do this with NetStat: When he is connected to you through ICQ or other tools (for example, sending him an ICQ message or send you a message), you immediately DOS
Enter netstat -n or netstat under PROMPT
-a can see the IP or ISP domain name used when the other party is on net. Even the port used is completely exposed, if you want to give him some lessons, this information is enough ...
IPConfig
IpConfig utility and its equivalent graphical user interface - Windows
WiniPCFG in 95/98 can be used to display the settings of the current TCP / IP configuration. This information is generally used to verify that manually configured TCP / IP settings is correct. However, if your computer and the local area network use dynamic host configuration protocol (Dynamic
Host Configuration Protocol, DHCP - Windows
One of NT assigns fewer IP addresses to more hosting protocols, similar to dynamic IP allocation of dial-up Internet access), the information displayed by this program may be more practical. At this time, IPConfig allows you to know if your computer is successful to rent to an IP address, if you rent it, you can understand what the address is currently allocated. Understanding the current IP address of the computer, the subnet mask, and the default gateway are actually the necessary items for testing and fault analysis.
The most common option:
ipconfig - Do not take any parameter options when using IPConfig, then display IP addresses, subnet masks, and default network values for each configured interface.
IPConfig
/ all - When using all options, IPConfig can display additional information (such as IP addresses, etc.) it has configured and needed for DNS and WINS servers, and display the physical address (MAC) built in the local network card. If the IP address is rented from the DHCP server, IPConfig will display the DHCP server's IP address and rental addresses are expected to expire (for details on DHCP server, please see other books for NT servers or ask your network management), its output Information is shown in the lower half of Figure 6.
Ipconfig / Release and IPConfig
/ renew - This is two additional options that can only work on a computer that leases its IP address to the DHCP server. If you enter ipconfig
/ release, then the rental IP address of all interfaces is re-delivered to the DHCP server (returned to the IP address). If you enter ipconfig
/ renew, then the local computer will try to contact the DHCP server and rent an IP address. Note that in most cases the NIC will be re-emphasized and the same IP address previously given.
If you are using Windows
95/98, then you should be more accustomed to use WiniPCFG instead of ipconfig because it is a graphical user interface, and the information displayed is the same as IPConfig, and also provides an option to publish and update dynamic IP addresses.
If you purchased a Windows NT Resource Kit (NT resource package), WindowsNT also contains a graphical replacement interface, the name of the utility is WinTIPCFG, and Windows 95/98 WiniPCFG is similar.
ARP (Address Conversion Protocol)
ARP is an important TCP / IP protocol and is used to determine the physical address of the network card corresponding to the IP address. Practical ARP commands, you can view current content in the ARP cache of local computers or another computer. In addition, use the ARP command, you can also use the static network card physical / IP address, you might use this way for the default gateway and local server, etc., help to reduce the network. The amount of information.
According to the default setting, the project in the ARP cache is dynamic, and whenever a data report for a specified location and there is no current project in the cache, the ARP will automatically add the item. Once the cache project is entered, they have begun to go to the failure state. For example, in Windows
In the NT network, if you do not use it after entering the project, the physical / IP address is invalid within 2 to 10 minutes. Therefore, if the project is rare or at all in the ARP cache, please don't be strange, you can add it through another computer or router's PING command. So, you need to view the contents of the cache via the ARP command, please first ping
This computer (cannot be a Ping command to send the ping command).
Common command options:
ARP -A or ARP
-g - All items used to view the cache. The result of the -A and -G parameters is the same, and -g has always been an option to display all items in the ARP cache for many years, and Windows is ARP.
-A (-A can be considered ALL, that is, all the meaning), but it can also accept comparing traditional -g options.
ARP -A IP - If you have multiple NIC, use the ARP -A plus the IP address of the interface, you can display only the ARP cache item related to the interface.
ARP -S IP
Physical address - You can manually enter a static project to the ARP cache. The project will remain active during the computer boot process, or when an error occurs, the manually configured physical address will automatically update the item.
ARP -D IP - Use this command to manually delete a static project.
Seeing this, you may have been tired ... In fact, it is enough for general users - you can use the ipconfig and ping command to view your network configuration and determine if it is correct, you can use NetStat to view others with you. Connection and identify IP information hidden by ICQ users, you can use ARP to view the MAC address of the NIC - these already let you lose the title of the rookie. If you are not satisfied, then "hard scalp" (below the content may be somewhat boring) Continue FOLLOW
ME ...
Tracert
When the datagram passes from your computer to the destination, the tracert command can be used to track the route (path) of the datagram. The utility tracking path is a path to the source computer to the destination, and it cannot be guaranteed or considered to follow this path. If your configuration uses DNS, you often get the name of the city, address, and common communication company from the generated response. Tracert is a slower command (if your designated target address is relatively far), you need to give it 15 seconds for each router.
The use of Tracert is very simple, just need to follow an IP address or URL behind Tracert, Tracert will perform the corresponding domain name conversion. Tracert is generally used to detect the location of the fault, you can use Tracert
Which of the IP has a problem, although it is still not certain, it has already told our question, you can also have a very sure to tell others - a certain problem. Route
Most hosts are generally located on a network segment that is only connected to a router. Since there is only one router, there is no problem that uses which router to publish the datagram to the remote computer, the IP address of the router can be entered as the default gateway of all computers on the network segment.
However, when there are two or more routers on the network, you don't have to rely on the default gateway. In fact, you may want to pass some of the remote IP addresses through a particular router, while other remote IPs are passed through another router.
In this case, you need the corresponding routing information, which is stored in the routing table, each host and each router is equipped with its own unique routing table. Most routers use specialized routing protocols to exchange and dynamically update the routing table between the routers. However, in some cases, it must be manually added to the router and the routing table on the host. Route is used to display, manually add and modify routing table items.
General use options:
Route
Print - This command is used to display the current item in the routing table, and the output results on the single router network segment are shown in Figure 12, since the network card is configured with an IP address, all of these items are automatically added.
Route
Add - Use this command to add a pathway project to a routing table. For example, if you want to set a route to the destination network 209.98.32.33, there is a 5 router network segment, first go through a router on the local network, the device IP is 202.96.123.5, the subnet mask is 255.255.255.224 Then you should enter the following command:
Route Add 209.98.32.33 Mask 255.255.255.224 202.96.123.5 Metric 5
Route
Change - You can use this command to modify the traffic route of the data, however, you cannot use this command to change the destination of the data. The following example can change the route of the data to another router, which uses a straight path containing 3 network segments:
Route Add 209.98.32.33 Mask 255.255.255.224 202.96.123.250 metric
3
Route delete - Use this command to delete routing from the routing table. For example: Route delete 209.98.32.33
NBTSTAT
NBTSTAT (NetBIOS Statistics on TCP / IP) utility is used to provide statistics about NetBIOS. With NetBIOS, you can view NetBIOS name forms on your local computer or remote computer.
Common options:
NBTSTAT-N - Display the local name and service program
NBTSTAT
-c - This command is used to display the contents of the NetBIOS name cache. The NetBIOS name cache is used to inch the NetBIOS name and IP address pair of other computers that have recently communicated with this computer.
NBTSTAT -R - This command is used to clear and reload the NetBIOS name cache.
NBTSTAT -A IP - Displays the physical address and name list of another computer via IP, and what you display is like the other computer yourself running NBTSTATATATATATATATATATATAT
-N
NBTSTAT -S IP - Displays the NetBIOS connection table for another computer of the Practical IP address.
Net
NET commands have many functions for practical and verify the NetBIOS connection between your computer. Here I only introduce two most common: Net View and Net Use.
Net view
UNC - Use this command, you can view the shared point name on the target server. People in any local area can issue this command and do not need to provide user ID or password. The UNC name is always starting, followed by the name of the target computer. For example, NetView LX is a share point of the computer that views the host name LX.
NET USE local origin
Target Computer Sharing Point - This command is used to establish or uncheck the image driver of a specific shared point (if needed, you must provide user ID or password). For example, you enter NET
USE F:
LXMP3 is to connect the image drive F: Connect to the LXMP3 shared point, you can access F: you can access the LXMP3 shared point, this is similar to the "My Computer" to select the mapping network drive.