How to use Trace route command

How to use Trace route command

Trace route command is one of the important network diagnostic tool which helps the administrators to find whether the information (Data Packets) have been sent from one system to another system over the network. This command also informs about the network path and the router details from where the packets have been travelled and in which routers it has passed through to reach the destination.

Syntax of the trace route command is as follows:

Cmd:>tracert ipaddress or domain name

Where tracert ? command used for trace route
Ipaddress ? System ip address to be tested

Open the command prompt (Start-> Run and then type cmd and press enter.) Now let's see the example for the domain google.com

C:\>tracert google.com

Tracing route to google.com [209.85.147.104]
over a maximum of 30 hops:

1 <1 ms <1 ms <1 ms 10.13.170.3
2 3 ms <1 ms <1 ms 158.234.204.1
3 <1 ms <1 ms <1 ms 121.242.18.65.static-chennai.vsnl.net.in [121.242.18.65]
4 54 ms 8 ms 11 ms 121.243.112.117
5 4 ms 4 ms 2 ms illchn-static-203.199.247.238.vsnl.net.in [203.199.247.238]
6 4 ms 4 ms 3 ms illchn-static-203.199.247.238.vsnl.net.in [203.199.247.238]
7 78 ms 73 ms 2 ms 172.31.35.97
8 6 ms 2 ms 6 ms 121.240.1.46
9 6 ms 29 ms 103 ms 216.239.43.142
10 36 ms 35 ms 65 ms 66.249.94.72
11 174 ms 220 ms 145 ms 72.14.232.115
12 202 ms 200 ms 197 ms 72.14.236.21
13 294 ms 283 ms 275 ms 66.249.94.197
14 257 ms 256 ms 251 ms 216.239.43.81
15 284 ms 278 ms 277 ms 216.239.46.214
16 345 ms 354 ms 377 ms 209.85.250.55
17 366 ms 369 ms 361 ms 66.249.95.173
18 368 ms 355 ms 358 ms 209.85.249.29
19 404 ms 377 ms 362 ms 216.239.46.253
20 372 ms 365 ms 354 ms bru01m01-in-f104.1e100.net [209.85.147.104]

Trace complete.

The above is the result when we use the trace route command for the domain google.com. Initially it displays the message for tracing the domain google.com and displays IP address of that domain. Next it displays the information about the router the data passes to reach its destination.

The trace route command is very useful to identify exactly where the problem occurs and we can able to isolate the issue and rectify with the particular area. Also we can use both the Ping and tracert command for testing purpose and then we can easily isolate the issue. Once the trace has been completed you will get the message as Trace Complete at the end of the execution of this command.

Switches:

Tracert command uses the following switches:

-d Do not resolve addresses to hostnames.
-h maximum_hops Maximum number of hops to search for target.
-j host-list Loose source route along host-list.
-w timeout Wait timeout milliseconds for each reply.

Generally this command traces for the maximum of 30 hops.

List of five MS-DOS commands

List of five MS-DOS commands

Introduction


DOS commands are the basics for the operating system and the famous operating system Windows that was developed by Microsoft takes these commands as basic and developed the operating system. All these commands will be used in dos command prompt.

MS-DOS commands


Let us now see five MS-DOS commands, which are very useful for the beginners and they are as follows.
md
cd
dir
copy
del

MD


MD is the command used to create or make a directory. This command will create a new directory in the specified path where you are navigated.

Syntax
cmd> MD [directory name]

Example
md isc -- This will create a new directory called isc in the path which you are currently using the command line.

CD


CD is the command used to change the directory. This command is used to view the current directory and also used to switch over to other directories.
Syntax
cmd> CD [/D] [drive:][path]
cmd> CD [..]

The double dot (..) specifies to change to the parent directory.
/D switch is to change current drive in addition to changing current directory for a drive.

Example
cd e: This will change your current directory to E.

Dir


This command is called the directory command and used to display the list of files and folders in that particular directory.

Syntax
cmd> dir

Copy


Copy command is used to copy a single or set of files from source directory to destination directory.

Syntax
cmd> copy [source] [destination]

Example
copy test1.txt test2.txt
This command will create the file called test2 and copy the content of test1 into test 2. After the copy has been done, the following message will be appearing in your screen

D:\New>copy test1.txt test2.txt
1 file(s) copied.

Del


Del command is used to delete the file or folder from the specified directory.

Syntax
cmd> del [file or folder name]

Example
del test1.txt

Creating a partition on a hard disk without formatting

Creating a partition on a hard disk without formatting

Often, the hard disks on our computers have only one partition, which means that our data and the operating system files are stored on the same partition. In the event of a system crash, when the only option is to reinstall the operating system, we end up losing our data. Hence, to avoid this data loss, we will have a look at how to create a separate partition to store data safely.

It is so convenient to store what we frequently use on our computer hard disk. Right from important documents, to other recreational things like songs, movies and photos, everything is ready to use at the distance of a few clicks. But what happens when your operating system goes haywire and the only option is to reinstall it. Now, if your valuable data happens to be on the same drive or partition as your operating system, it is invariably lost if you need to reinstall your operating system. This is because when you reinstall your OS, you have to format the drive on which it is to be installed. Formatting means deleting all data on the drive and preparing it for a fresh installation.

So how to prevent your valuable data from being lost if you have to reinstall your operating system, while keeping your data on the computer itself? The solution to this is to keep your operating system data on one partition and your data on another partition. But what if you have only one partition and your operating system is already installed? We will see how you can create a new partition on your hard disk on which your operating system is already installed.
The following instructions are specifically for Microsoft Windows 7, though other versions of Windows will have similar procedures.

What we need to do first is to shrink our existing partition to a smaller size, so a new partition can be created. You can do so by following these steps -


Go to Computer

Click on Control Panel in the top right section

Go to the System and Security section

Click on Administrative Tools

Double click on Computer Management

In the list on the left side, select Disk Management

In Disk Management, all the information about your drives is given. Now, shrink the primary partition, right click on the partition as shown in the picture above and click on Shrink Volume. The system will check how much the size of the drive can be reduced, and it will ask you to specify the size in Megabytes. After you specify the sizes, click on Shrink.

After you shrink a partition, there will be unallocated space on your hard disk, which you can use to create a new partition. To create a new partition, right click on the unallocated space and select New Simple Volume. Make sure you specify that you do not want to format the drive in the dialogue boxes that follow while you create a new volume. After specifying the size and the drive name, the system will create a new partition on your hard disk.

After creation, before using a new partition, the system asks you to format the new volume. After formatting, your new volume is ready to be used, and your data can be safely stored on a separate partition without worrying about data loss in the event of a system crash.

How to find IP address of a Windows computer or Mac

How to find IP address of a Windows computer or Mac

What is IP Address?

IP - Internet Protocol address..
To make it simple IP address is like an address to the computer which is

connected to a network.It has two versions IPv4 & IPv6.It can be commonly

classified as,
Public
Private
Static
Dynamic

Public IP address:
Public IP address is obtained to your computer when connected to the server

including internet websites and DNS servers


Private IP address:
Private IP address is obtained to your computer when connected to a LAN

network


Static IP address:
Static IP address is obtained to your computer when connected to Internet

Service Provider who provides a single IP address which is dedicated only to

that particular user


Dynamic IP address:
Dynamic IP address is obtained to your computer when connected to Internet

Service Provider who get new IP address every thing when he logs in


How to find IP address?

Windows (using command prompt)
Windows 7
Windows Vista
Windows XP

=> Start
=> All Programs
=> Accessories
=> Command Prompt
=> Enter: ipconfig

or

==> Start
==> Run
==> cmd
==> Enter: ipconfig

Windows (without using command prompt)
Windows 7

=> Near Data & Time click the Network connection icon
=> Select Open Network and Sharing Center
=> Click Local Area Connection or Wireless Network Connection
=> Click on Show Detail

Windows Vista

=> Start
=> Control Panel
=> Network
=> Right Click and Select Properties
=> Shows Network and Sharing Center
=> To right hand side click on "View Status" of Local Area Connection or

Wireless Network Connection

Windows XP

=> Start
=> Control Panel
=> Network Connection
=> Right Click and Select Properties
=> Click Support

Mac OS X

OS X 10.6 or 10.5

=> Apple menu
=> Select System Preferences
=> Click the View menu
=> Select Network
=> In the Network preference window click a network port (e.g., Ethernet,

AirPort, modem)
=> Under "Status:" you can see the IP address

OS X 10.4 or 10.3

=> Apple menu
=> Select Location
=> Network Preferences
=> Next to "Show:" select Network Status

How to free disk space on computer

How to free disk space on computer


This tutorial will provide you some ways to free some disk space on your computer.

Less space on hard disk can be frustrating at times. To immediately recover some gigabytes of space on your computer, here is a healthy tip. When a new software is being installed on the system, what we need to do is update the existing drivers and patch them. In this process the snapshot of the whole system is taken to restore is any kind of malfunctioning. By this we can always reach to a previous stable working state. While doing so the Windows take the backup of most other applications and pictures. Actually the copies of the files known by he name shadow copies are created and this feature is available with Windows vista as well as with Windows 7.

While running this procedure some space is being occupied by these copies every time we restore our system. This space can be in gigabytes. For effective utilization of this occupied space, one thing can be to remove all the older restore points, nextly remove all the restore points in case the system is working fine and has an effective firewall protecting it from vulnerable threats.

Procedure to free disk space

Open the command prompt by typing cmd in run.The enter the admin mode by pressing ctrl+shift+enter. A window is shown and click yes to proceed further.
A command c:\>vssadmin delete shadows /for=c: /oldest needs to written to delete only the shadow copies.
For removing all the shadow copies type c:\>vssadmin delete shadows /for=c: /all

Reasons for avoiding shadow copies

The system automatically creates the copies of flies and keeps on exhausting space. When the system starts running out of space, it deletes the old copies to retain the new ones. To keep oneself updated on the space config, type sysdm.cpl. This opens the system properties dialog. Then we need to click on the system protection tab and then configure. The space occupied is then revealed. We can always adjust by moving the cursor to the left or the right. However there is a minimum requirement of 300MB space for backup.

After configuring

Go to the System protection and then create a snapshot of the newly created system. The backup of the present working state of the system is created.

How to use Ping command

How to use Ping command


Ping command is used to check whether the computer can be reached on the network and if so, how long it takes. Ping command is the basic network test done by the system administrators. We can use the IP address or the computer name to test whether the system is reachable in the network where we are searching for. Generally ping command is used for the network diagnostic test.

The ping command can be used by the following syntax

Ping (computer name or IP address)

Example: ping yahoo.com
Example: ping 67.195.160.76

Once the above command is been executed, you will get the result as follows:

Pinging yahoo.com [67.195.160.76] with 32 bytes of data:

Reply from 67.195.160.76: bytes=32 time=384ms TTL=45
Reply from 67.195.160.76: bytes=32 time=338ms TTL=45
Request timed out.
Reply from 67.195.160.76: bytes=32 time=279ms TTL=45

Ping statistics for 67.195.160.76:
Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),
Approximate round trip times in milli-seconds:
Minimum = 279ms, Maximum = 384ms, Average = 333ms

The result will inform you about the packets received successfully and packets losses during the transaction. TTL is nothing but Time To Live where in which it describes about the life of the packets before its been discarded.

Also there are lots of switches available with the ping command for the diagnostic test and they are

-t Ping the specified host until stopped.
-a Resolve addresses to hostnames.
-n count Number of echo requests to send.
-l size Send buffer size.
-f Set Don't Fragment flag in packet.
-i TTL Time To Live.
-v TOS Type of Service.
-r count Record route for count hops.
-s count Timestamp for count hops.

Example: ping yahoo.com –t

This will ping the yahoo.com server until we forcibly stop this ping request. Once this command executed, the following request will appear on your command prompt:

Pinging yahoo.com [67.195.160.76] with 32 bytes of data:

Reply from 67.195.160.76: bytes=32 time=402ms TTL=45
Reply from 67.195.160.76: bytes=32 time=353ms TTL=45
Reply from 67.195.160.76: bytes=32 time=438ms TTL=45
Request timed out.
Reply from 67.195.160.76: bytes=32 time=280ms TTL=45
Reply from 67.195.160.76: bytes=32 time=393ms TTL=45
Reply from 67.195.160.76: bytes=32 time=336ms TTL=45
Reply from 67.195.160.76: bytes=32 time=289ms TTL=45
Reply from 67.195.160.76: bytes=32 time=326ms TTL=45
Reply from 67.195.160.76: bytes=32 time=356ms TTL=45
Reply from 67.195.160.76: bytes=32 time=328ms TTL=45
Reply from 67.195.160.76: bytes=32 time=336ms TTL=45
Reply from 67.195.160.76: bytes=32 time=291ms TTL=45
Reply from 67.195.160.76: bytes=32 time=401ms TTL=45

Request Timed Out (generally referred as RTO) will be displayed if the server is unreached at the specified time limit. If the system is not available in the network at all, then you will get the RTO when you try to ping that particular system.

CCNA COURSE STRUCTURE

CCNA COURSE STRUCTURE

 
^ Scroll to Top