O B J E C T I V

Total Page:16

File Type:pdf, Size:1020Kb

O B J E C T I V 34384_CPEG_04 2/17/2005 17:3:44 Page 208 OBJECTIVES 4.1 Given a troubleshooting scenario, select the appropriate network utility from the following: TRACERT / TRACEROUTE, NETSTAT, AND NBTSTAT UNDERSTANDING THE OBJECTIVE Tracert and traceroute are utilities used to send packets to a specified host and retrieve information on the path the packets took to reach the host. Netstat is a similar utility that provides information about all connected TCP/IP hosts, including the connections’ port numbers and status.Nbtstat is a utility that reveals the NetBIOS names and status of connected devices running NetBIOS over TCP/IP (NBT). WHAT YOU REALLY NEED TO KNOW ◆ Tracert on Windows systems (or traceroute on UNIX-type of systems) is a TCP/IP util- ity that traces the path of a packet from the originating host to another host. In its simplest form, it displays the number of router hops the packet traverses, those routers’ addresses, and how long the packet took to go from one router to the next. ◆ Tracert and traceroute are most useful for determining where network bottlenecks are occurring. They also indicate whether a host is unreachable. ◆ The most commonly used expression of the tracert command is tracert Y, where Y is the IP address or host name of a system. On a UNIX-type of system, sub- stitute traceroute for tracert. ◆ Netstat is a utility that displays specifics about active inbound and outbound TCP/IP connections on a host. When used in its most basic form, netstat displays the address (or host name) of connected systems, and the connected port, the type of Transport layer protocol in use, and the connection status. ◆ Netstat can be used with numerous parameters that supply more information about a host’s connections, including statistics for network interfaces and routing tables for active connections. ◆ Nbtstat displays information about connected devices running NetBIOS over TCP/IP. Thus, nbtstat is useful only on Windows-based networks. ◆ Nbtstat can be used with several parameters to discover, for example, the work- group and domain to which the NetBIOS machine belongs, MAC addresses, IP addresses, and sessions with connected hosts. ◆ Nbtstat is most commonly used with the following syntax to determine the Net- BIOS name of a machine: nbtstat –a X (where X is the machine’s IP address). OBJECTIVES ON THE JOB Nbtstat, netstat, and tracert/traceroute are included with the TCP/IP software provided with every modern operating system. Although many software developers have created updated versions of these utilities,they are so easy to use that many network administrators don’t bother with newer, modified versions. 208 NETWORK+ COURSEPREP 34384_CPEG_04 2/17/2005 17:3:45 Page 209 PRACTICE TEST QUESTIONS 1. Which of the following can reveal the time it takes a packet to reach a host? (Choose all that apply.) a. Telnet b. PING c. tracert d. netstat 2. Which of the following can reveal hackers connected to a TCP/IP host? a. PING b. Telnet c. tracert d. netstat 3. Which of the following can reveal the number of router hops a packet has taken on its way to a remote host? (Choose all that apply.) a. netstat b. PING c. tracert d. traceroute 4. If you are working on the help desk when a user calls and complains about slow connection times to a particular Web site, what utility would you recommend using to locate the performance problem? a. SNMP b. netstat c. nbtstat d. tracert 5. What parameter should be used with the nbtstat command when attempting to determine the Net- BIOS name of a machine whose IP address you know? a. -a b. -s c. -i d. -I 6. Suppose you are logged on to the Internet and have accessed the www.yahoo.com Web site. What utility would you use to determine which port on your machine is being used to connect to the Web site? a. nbtstat b. netstat c. Telnet d. tracert 7. The nbtstat utility can easily show whether an IP gateway to the Internet is down. True or False? NETWORK+ COURSEPREP 209 34384_CPEG_04 2/17/2005 17:3:45 Page 210 OBJECTIVES 4.1 Given a troubleshooting scenario, select the appropriate network utility from the following (continued): PING UNDERSTANDING THE OBJECTIVE The PING (Packet Internet Groper) utility is one of the most commonly used trouble- shooting tools. PING sends at least one packet to the specified host and waits for a response. If there is no response, you can assume that the device or its TCP/IP stack is not functioning properly.If there is a response, information about the packets’ return, such as the time it took the packets to reach the host, helps in discovering network performance problems. WHAT YOU REALLY NEED TO KNOW ◆ PING is a TCP/IP utility that uses the ICMP protocol to send at least one packet to a specified address and waits for a response. ◆ PING is a powerful troubleshooting tool. It is primarily used to help determine whether a node on a TCP/IP-based network is connected and responding. ◆ PING assigns a sequence number and time stamp to the UDP packets it sends. Thus, if the response from the device is positive, PING can also detect how long the packets took to return and whether any were damaged in transmission. This can be helpful in troubleshooting network performance problems. ◆ PING is often the first troubleshooting tool used when a client cannot communi- cate with a server or vice versa. ◆ The syntax of a simple PING command is ping X, where X is the IP address or host name of the device. If the host responds, the output contains the following message: reply from X: bytes=32 time=100 ms TTL=252, where X is the IP address or host name. The other numbers may vary. ◆ One of the first PING commands to try is ping 127.0.0.1. This IP address is reserved for the loopback address. Use this command to attempt to contact your own device’s TCP/IP stack. If this command results in a negative response, chances are your TCP/IP protocol is corrupted or improperly installed. ◆ If the loopback PING test results in a positive response, the next devices to ping include another local host, the default IP gateway, the DNS server, or other critical devices on the network. Pinging different devices can uncover a network bottleneck. OBJECTIVES ON THE JOB PING is perhaps the most useful and frequently used utility in the network technician’s trouble- shooting repertoire. In a situation in which a client cannot access a server, PING can help determine where the problem is occurring. In most cases, sufficient information about a downed node or bottleneck can be obtained from the simple PING command. However, in some cases, using one of the many PING parameters provides a necessary troubleshooting clue. 210 NETWORK+ COURSEPREP 34384_CPEG_04 2/23/2005 13:49:25 Page 211 PRACTICE TEST QUESTIONS 1. What TCP/IP protocol does PING use to request responses from devices? a. SNMP b. SMTP c. ICMP d. RARP 2. Which of the following is the loopback address in the IP version 4 addressing scheme? a. 100.100.100.100 b. 01.01.01.01 c. 122.0.0.7 d. 127.0.0.1 3. What does TTL stand for? a. Time to Live b. Time to Link c. Transfer Time Load d. Transfer Time Lost 4. Which of the following can a PING test indicate? (Choose all that apply.) a. what type of device is being contacted b. whether a packet has been corrupted in transit c. how many routers a packet has to traverse on its way to a host d. how long it takes for a packet to reach a host 5. In a response to a PING command, which of the following might point to a network congestion problem? a. widely fluctuating TTL values b. excessive corrupted packets c. a host name listed as the responding node, rather than the IP address you typed d. a different host name than that listed in the original PING command 6. Suppose that a client on a private LAN is connected to the Internet but cannot reach the www.microsoft.com Web page. However, the client’s loopback PING test is positive, and the client can reach www.netscape.com. What should you ping next? a. the LAN’s gateway router b. the nearest core Internet gateway c. the ISP’s DNS server d. www.microsoft.com 7. On which Transport layer protocol does PING rely? a. TCP b. UDP c. ARP d. FTP NETWORK+ COURSEPREP 211 34384_CPEG_04 2/17/2005 17:3:45 Page 212 OBJECTIVES 4.1 Given a troubleshooting scenario, select the appropriate network utility from the following (continued): ARP AND NSLOOKUP /DIG UNDERSTANDING THE OBJECTIVE ARP (Address Resolution Protocol) can be used as a diagnostic utility to provide information about a computer’s ARP table. Nslookup and dig (domain information groper) provide information about a network’s DNS database. WHAT YOU REALLY NEED TO KNOW ◆ The ARP utility provides a way of manipulating and obtaining information from a device’s ARP table. It can be a valuable troubleshooting tool for discovering the identity of a machine whose IP address you know, or for solving the problem of two machines trying to use the same IP address. ◆ On a Windows system, typing the ARP command displays the proper syntax and list of switches available for this command. To return useful data, the ARP command requires at least one switch. For example, arp –a provides the entire ARP table for your host.
Recommended publications
  • Resolving Issues with Network Connectivity
    Module 6: Resolving Issues with Network Connectivity Lab: Resolving Network Connectivity Issues (VMs: 10982D-LON-DC1, 10982D-LON-CL1) Exercise 1: Configuring Network Settings Task 1: Verify and configure network settings 1. Switch to LON-CL1. 2. Right-click Start, and then select Windows PowerShell (Admin). 3. At the Windows PowerShell (Admin) command prompt, type the following command, and then press Enter: test-connection LON-DC1 4. At the command prompt, type the following command, and then press Enter: netstat –n 5. If no connections appear, create a connection. To create a connection, in the Type here to search box, type \\LON-DC1 and then press Enter. 6. In File Explorer, double-click NETLOGON. 7. At the command prompt, type the following command, and then press Enter: netstat –n Note: If no connections are present, move on to the next step. 8. Click Start, type Control Panel and then press Enter. 9. In Control Panel, click Network and Internet, and then click Network and Sharing Center. 10. In Network and Sharing Center, click Ethernet. 11. In the Ethernet Status dialog box, click Properties. 12. Click Internet Protocol Version 4 (TCP/IPv4), and then click Properties. 13. In the Properties dialog box, click Obtain an IP address automatically. 14. Click Obtain DNS server address automatically. 15. Click OK to save the changes. 16. In the Ethernet Properties dialog box, click Close. 17. In the Ethernet Status dialog box, click Close. 18. At the Windows PowerShell command prompt, type the following command, and then press Enter: Get-NetIPAddress Task 2: Troubleshoot name resolution 1.
    [Show full text]
  • IBM Cognos Analytics - Reporting Version 11.1
    IBM Cognos Analytics - Reporting Version 11.1 User Guide IBM © Product Information This document applies to IBM Cognos Analytics version 11.1.0 and may also apply to subsequent releases. Copyright Licensed Materials - Property of IBM © Copyright IBM Corp. 2005, 2021. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. IBM, the IBM logo and ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at " Copyright and trademark information " at www.ibm.com/legal/copytrade.shtml. The following terms are trademarks or registered trademarks of other companies: • Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. • Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. • Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. • Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. • UNIX is a registered trademark of The Open Group in the United States and other countries. • Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates.
    [Show full text]
  • A Dll Required for This Install Could Not Be Run
    A Dll Required For This Install Could Not Be Run Foldable Hannibal saunter anticipatorily and respectably, she reseat her wentletrap overlaid retractively. Which Arne igniting butso cheap berrying that her Dickie instruments triturated flying. her tanists? Analyzed Giovanne still encyst: salt and Circassian Whitby outface quite fervently This product was an option, microsoft distributed dll required dll for could not a install the problem for fixing the table doe Will not a install could be run this dll required for what is solved by multiple rows into boot. How to resolve my case, code and performance cookies and this dll for install a could not be run in. Any solution is required actions, hardware failure and be. If he're running Windows installation as the repair source or sale you're using Windows from a. Thank you for safe prompt response. A DLL required for this installation to complete could not be run. Does this solution from your pc scan with windows installer on target system is this tool in any proposed solutions to use windows updates about how did run a this dll required for could not install be. Reddit on the respective owners in this dll for a required. Set properties are you hate cookies may not a install be run this dll required for instant savings! Could not initialized handler. Your pc and framework, dll could not be able to customize it? Qgis also for this issue, dll required for could not a install it is a time i run. Fix problems installing Chrome Google Chrome Help.
    [Show full text]
  • 1. Run Nslookup to Obtain the IP Address of a Web Server in Europe
    1. Run nslookup to obtain the IP address of a Web server in Europe. frigate:Desktop drb$ nslookup home.web.cern.ch Server: 130.215.32.18 Address: 130.215.32.18#53 Non-authoritative answer: home.web.cern.ch canonical name = drupalprod.cern.ch. Name: drupalprod.cern.ch Address: 137.138.76.28 Note that the #53 denotes the DNS service is running on port 53. 2. Run nslookup to determine the authoritative DNS servers for a university in Asia. frigate:Desktop drb$ nslookup -type=NS tsinghua.edu.cn Server: 130.215.32.18 Address: 130.215.32.18#53 Non-authoritative answer: tsinghua.edu.cn nameserver = dns2.tsinghua.edu.cn. tsinghua.edu.cn nameserver = dns.tsinghua.edu.cn. tsinghua.edu.cn nameserver = dns2.edu.cn. tsinghua.edu.cn nameserver = ns2.cuhk.edu.hk. Authoritative answers can be found from: dns2.tsinghua.edu.cn internet address = 166.111.8.31 ns2.cuhk.edu.hk internet address = 137.189.6.21 ns2.cuhk.edu.hk has AAAA address 2405:3000:3:6::15 dns2.edu.cn internet address = 202.112.0.13 dns.tsinghua.edu.cn internet address = 166.111.8.30 Note that there can be multiple authoritative servers. The response we got back was from a cached record. To confirm the authoritative DNS servers, we perform the same DNS query of one of the servers that can provide authoritative answers. frigate:Desktop drb$ nslookup -type=NS tsinghua.edu.cn dns.tsinghua.edu.cn Server: dns.tsinghua.edu.cn Address: 166.111.8.30#53 tsinghua.edu.cn nameserver = dns2.edu.cn.
    [Show full text]
  • VNC User Guide 7 About This Guide
    VNC® User Guide Version 5.3 December 2015 Trademarks RealVNC, VNC and RFB are trademarks of RealVNC Limited and are protected by trademark registrations and/or pending trademark applications in the European Union, United States of America and other jursidictions. Other trademarks are the property of their respective owners. Protected by UK patent 2481870; US patent 8760366 Copyright Copyright © RealVNC Limited, 2002-2015. All rights reserved. No part of this documentation may be reproduced in any form or by any means or be used to make any derivative work (including translation, transformation or adaptation) without explicit written consent of RealVNC. Confidentiality All information contained in this document is provided in commercial confidence for the sole purpose of use by an authorized user in conjunction with RealVNC products. The pages of this document shall not be copied, published, or disclosed wholly or in part to any party without RealVNC’s prior permission in writing, and shall be held in safe custody. These obligations shall not apply to information which is published or becomes known legitimately from some source other than RealVNC. Contact RealVNC Limited Betjeman House 104 Hills Road Cambridge CB2 1LQ United Kingdom www.realvnc.com Contents About This Guide 7 Chapter 1: Introduction 9 Principles of VNC remote control 10 Getting two computers ready to use 11 Connectivity and feature matrix 13 What to read next 17 Chapter 2: Getting Connected 19 Step 1: Ensure VNC Server is running on the host computer 20 Step 2: Start VNC
    [Show full text]
  • Command-Line IP Utilities This Document Lists Windows Command-Line Utilities That You Can Use to Obtain TCP/IP Configuration Information and Test IP Connectivity
    Guide to TCP/IP: IPv6 and IPv4, 5th Edition, ISBN 978-13059-4695-8 Command-Line IP Utilities This document lists Windows command-line utilities that you can use to obtain TCP/IP configuration information and test IP connectivity. Command parameters and uses are listed for the following utilities in Tables 1 through 9: ■ Arp ■ Ipconfig ■ Netsh ■ Netstat ■ Pathping ■ Ping ■ Route ■ Tracert ARP The Arp utility reads and manipulates local ARP tables (data link address-to-IP address tables). Syntax arp -s inet_addr eth_addr [if_addr] arp -d inet_addr [if_addr] arp -a [inet_address] [-N if_addr] [-v] Table 1 ARP command parameters and uses Parameter Description -a or -g Displays current entries in the ARP cache. If inet_addr is specified, the IP and data link address of the specified computer appear. If more than one network interface uses ARP, entries for each ARP table appear. inet_addr Specifies an Internet address. -N if_addr Displays the ARP entries for the network interface specified by if_addr. -v Displays the ARP entries in verbose mode. -d Deletes the host specified by inet_addr. -s Adds the host and associates the Internet address inet_addr with the data link address eth_addr. The physical address is given as six hexadecimal bytes separated by hyphens. The entry is permanent. eth_addr Specifies physical address. if_addr If present, this specifies the Internet address of the interface whose address translation table should be modified. If not present, the first applicable interface will be used. Pyles, Carrell, and Tittel 1 Guide to TCP/IP: IPv6 and IPv4, 5th Edition, ISBN 978-13059-4695-8 IPCONFIG The Ipconfig utility displays and modifies IP address configuration information.
    [Show full text]
  • Lab 5.5.2: Examining a Route
    Lab 5.5.2: Examining a Route Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway S0/0/0 10.10.10.6 255.255.255.252 N/A R1-ISP Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0 10.10.10.5 255.255.255.252 10.10.10.6 R2-Central Fa0/0 172.16.255.254 255.255.0.0 N/A N/A 192.168.254.254 255.255.255.0 192.168.254.253 Eagle Server N/A 172.31.24.254 255.255.255.0 N/A host Pod# A N/A 172.16. Pod#.1 255.255.0.0 172.16.255.254 host Pod# B N/A 172.16. Pod#. 2 255.255.0.0 172.16.255.254 S1-Central N/A 172.16.254.1 255.255.0.0 172.16.255.254 All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 7 CCNA Exploration Network Fundamentals: OSI Network Layer Lab 5.5.1: Examining a Route Learning Objectives Upon completion of this lab, you will be able to: • Use the route command to modify a Windows computer routing table. • Use a Windows Telnet client command telnet to connect to a Cisco router. • Examine router routes using basic Cisco IOS commands. Background For packets to travel across a network, a device must know the route to the destination network. This lab will compare how routes are used in Windows computers and the Cisco router.
    [Show full text]
  • User Guide 8.2.4
    User Guide 8.2.4 Copyright Manual Copyright © 2000-2017 AB Software Consulting Ltd. All rights reserved. AB Software Consulting Ltd. reserves the right to revise this document and to make changes from time to time in the content hereof without obligation to notify any person or persons of such revisions or changes. The software described in this document is supplied under a licence agreement and is protected by UK and international copyright laws. Any implied warranties including any warranties of merchantability or fitness for a particular purpose are limited to the terms of the express warranties set out in the licence agreement. Software Copyright © 2000-2017 AB Software Consulting Ltd. All rights reserved. Trademarks AB Tutor is the registered trademark of AB Software Consulting Ltd. Windows, Windows 7/8/10/2003/2008/2012 are trademarks of Microsoft Corporation. Other products, trademarks or registered trademarks are the property of their respective owners. Contents Using AB Tutor Introduction The AB Tutor interface What is AB Tutor? The list view Basic ABT setup The thumbnail view Advanced setup options Commands Introduction to passwords Power commands Startup passwords Connecting to clients Connection password Screen sharing Startup switches Chat (text and audio) Installation Screen Capture Installation on Windows File transfers Installation on Mac OS Key Sequences Installation on iPad Admin commands Activating AB Tutor Launch Push out updates Policies Uninstallation Block printer Remote Deployment Utility Block external drive Site
    [Show full text]
  • Copyrighted Material
    Index Numerics Address Resolution Protocol (ARP), 1052–1053 admin password, SOHO network, 16-bit Windows applications, 771–776, 985, 1011–1012 900, 902 Administrative Tools window, 1081–1083, 32-bit (x86) architecture, 124, 562, 769 1175–1176 64-bit (x64) architecture, 124, 562, 770–771 administrative tools, Windows, 610 administrator account, 1169–1170 A Administrators group, 1171 ADSL (Asynchronous Digital Subscriber Absolute Software LoJack feature, 206 Line), 1120 AC (alternating current), 40 Advanced Attributes window, NTFS AC adapters, 311–312, 461, 468–469 partitions, 692 Accelerated Graphics Port (AGP), 58 Advanced Computing Environment (ACE) accelerated video cards (graphics initiative, 724 accelerator cards), 388 Advanced Confi guration and Power access points, wireless, 996, 1121 Interface (ACPI) standard, 465 access time, hard drive, 226 Advanced Graphics Port (AGP) card, access tokens, 1146–1147 391–392 Account Operators group, 1172 Advanced Graphics Port (AGP) port, 105 ACE (Advanced Computing Environment) Advanced Host Controller Interface (AHCI), initiative, 724 212–213 ACPI (Advanced Confi guration and Power Advanced Micro Devices (AMD), 141–144 Interface) standard, 465 Advanced Packaging Tool (APT), 572 Action Center, 1191–1192 Advanced Power Management (APM) Active Directory Database, 1145–1146, 1183 standard, 465 active heat sink, 150 Advanced Programmable Interrupt active matrix display, LCD (thin-fi lm Controller (APIC), 374 transistor (TFT) display), 470 Advanced RISC Computing Specifi cation active partition, 267,
    [Show full text]
  • System Analysis and Tuning Guide System Analysis and Tuning Guide SUSE Linux Enterprise Server 15 SP1
    SUSE Linux Enterprise Server 15 SP1 System Analysis and Tuning Guide System Analysis and Tuning Guide SUSE Linux Enterprise Server 15 SP1 An administrator's guide for problem detection, resolution and optimization. Find how to inspect and optimize your system by means of monitoring tools and how to eciently manage resources. Also contains an overview of common problems and solutions and of additional help and documentation resources. Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its aliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About This Guide xii 1 Available Documentation xiii
    [Show full text]
  • Diskgenius User Guide (PDF)
    www.diskgenius.com DiskGenius® User Guide The information in this document is subject to change without notice. This document is not warranted to be error free. Copyright © 2010-2021 Eassos Ltd. All Rights Reserved 1 / 236 www.diskgenius.com CONTENTS Introduction ................................................................................................................................. 6 Partition Management ............................................................................................................. 6 Create New Partition ........................................................................................................ 6 Active Partition (Mark Partition as Active) .............................................................. 10 Delete Partition ................................................................................................................ 12 Format Partition ............................................................................................................... 14 Hide Partition .................................................................................................................... 15 Modify Partition Parameters ........................................................................................ 17 Resize Partition ................................................................................................................. 20 Split Partition ..................................................................................................................... 23 Extend
    [Show full text]
  • Introduction to Computer Networking
    www.PDHcenter.com PDH Course E175 www.PDHonline.org Introduction to Computer Networking Dale Callahan, Ph.D., P.E. MODULE 7: Fun Experiments 7.1 Introduction This chapter will introduce you to some networking experiments that will help you improve your understanding and concepts of networks. (The experiments assume you are using Windows, but Apple, Unix, and Linux systems will have similar commands.) These experiments can be performed on any computer that has Internet connectivity. The commands can be used from the command line using the command prompt window. The commands that can be used are ping, tracert, netstat, nslookup, ipconfig, route, ARP etc. 7.2 PING PING is a network tool that is used on TCP/IP based networks. It stands for Packet INternet Groper. The idea is to verify if a network host is reachable from the site where the PING command issued. The ping command uses the ICMP to verify if the network connections are intact. When a PING command is issued, a packet of 64 bytes is sent to the destination computer. The packet is composed of 8 bytes of ICMP header and 56 bytes of data. The computer then waits for a reply from the destination computer. The source computer receives a reply if the connection between the two computers is good. Apart from testing the connection, it also gives the round trip time for a packet to return to the source computer and the amount of packet loss [19]. In order to run the PING command, go to Start ! Run and in the box type “cmd”.
    [Show full text]