How to interrupt the ping in the command line. Get familiar with the Ping command. How to practice Ping

“Aah, help, everything is gone!” - as your inner voice reacts to the shaving of the connection with the server, this material is exactly for you. :) Insanely, from my side of the skin day robimo everything is possible, so that nothing respects your robot in the dark, but if you can get away force majeure - we'll sort it out. And in order to better understand the situation and understand, on whose side you have a pardon, the axis for you is the minimum-minimum - I’ll shave it off in front of you, trace the route and pin the intermediate nodes. How all tse robiti, at once rozpovіmo.

tracing the route

At the next hour, the transfer of data packets is sent between the local computer and the server. It does help to pass the path through the request to the server and determine at what stage the shaving is taken. Vikonati trasuvannya is easy to finish.

1. Run cmd command: win+r> write down cmd > ok.

tracert X.X.X.X(De X.X.X.X - server IP address or domain) and press Enter.

At the butt, we made a tracing for google.com.

tracert google.com

Wishlo like this:

1 2 1 ms 1 ms 1 ms 193.151.89.254
3 5 ms 4 5 1 ms 6 1 ms 7 1 ms 3 ms 1 ms bearline-ic-324086-ffm-b4.c.telia.net
8 1ms 1ms 1ms 108.170.251.129
9 13ms 13ms 15ms 66.249.94.135
10 13 ms 13 ms 13 ms fra15s12-in-f46.1e100.net

Like Bachimo, our bags were lifted ten (or less, so more) knots, and they were successfully lifted. In another turn, yakby packets “stumbled” on one of the nodes, on the new one (and the nodes advancing behind it) we would bob:

* * * The interval for acknowledgment for inquiry has been exceeded.

But it’s not yet an hour for visnovki in such a state of mind - this record can mean a waste of packages, so those who have taken the measure are simply closed by the security settings. Some providers specially adjust the universities so that the stench is not emitted on the shipping packages, in order to reduce the burden. In order to know exactly what kind of shave is to be done, and, just like that, then de same, it is necessary to pronounce the skin from the knots. When tracing, we took away the IP of the skin from them, which means we can go to ping.

Ping of intermediate hubs

Ping of appointments for reverification of the strength and quality of the day. Vikonati yoga is also awkward. When you run ping, you need to run it to all intermediate nodes in the next few windows. So, at the moment of shaving, you will see the link, on which node you spend the packets and how many times you shave.

In Windows, only a few packets are transferred for locking, which is not enough, so the problem manifests itself for a short time. Therefore, it is necessary to take the parameter exchange -t(Shob potim zupiniti exchange packets, press CTRL+C).

Now in order.

1. Run cmd command: win+r> write down cmd > ok.

2. At the command line, enter ping -t X.X.X.X(De X.X.X.X - the addresses of one of the intermediary hubs, which we recognized when tracing) and press Enter.

In our twirl, ten knots were revealed during trasuvanni, which means that it is necessary to vikonate ten times in ten okremikh vyknakh.

Korisno!
If you need to check the quality of the data, for Windows you can use the manual program PingPlotter.

Then, let's ping - in ten windows of the command line, we enter commands with the IP addresses of the nodes, which we showed when traversing. Our viewpad will have the following commands:

ping -t 10.1.1.1
ping -t 193.151.89.254
ping -t 85.195.75.129
ping -t 213.248.79.29
ping -t 62.115.139.50
ping -t 62.115.120.8
ping -t 62.115.153.215
ping -t 108.170.251.129
ping -t 66.249.94.135
ping -t 216.58.208.46

As if in the first few seconds, you chant “The interval of reckoning has been exceeded”, do not hurry to shout: “Gotcha!”. If such nodes are pinged normally, it means that they are simply blocked by the settings. In our case, for example, the transfer node (66.249.94.135) is easy to say that the interval of travel, but there are no problems with the ping of the tenth node.

On whose side is a pardon?

Otzhe, shaving again. But this time the launches of the intermediary hubs will help to “vindicate” the blame. Everything is simple here - from some node you started to see “The interval of ochіkuvannya has been exceeded”, that is a weak lanka.

Who is guilty - it is clear, now it is necessary to understand what to work in specific situations.

1. Stop vuzol. If the rest of the call to start pinging is normal (Windows machines do not respond to ping, this is set in the firewall settings) ...

... and after the shave, after showing "Observation interval exceeded", the shave is shown on your server.

In this way, go to the control panel, start the console and go to the operating system, in order to solve why the server does not work. If it appears that the operating system is hung, restart the server.

2. Be-yakі vuzli, krіm of the rest. If you feel like it, go to the tech support and gloomy, and Internet provider at once. At the same time, it’s clear to say, as if on the back of the head, the trasuvannya looked like a route, and to store the crossroads of the nodes from the appointments, on some of them, the shave was interrupted, and on some of them it was not. Be respectful, important information, do not have mercy.

3. All universities at the same time. As if all the windows with a ping started to show “Checkout interval exceeded”, the problem is in your computer, or less, until the connections are faulty.

Bonus!

Well, in order for you to feel comfortable already, we have added utilities here, with which you can work tracing and pinging intermediate nodes in one simple move without launching five fifteen new vicons.

For OS of the Windows family, this optimization is carried out by the utility winmtr. It won't need to be installed and is ready until later, after unpacking from the archive.

In the field Host enter the final server, with which the order will be reviewed, and press start:

At our butt, you can see the trace of the route and all the intermediate nodes. In this case, ICMP packets are sent to the skin from them, for which you can determine the quality of the link.

Vlasne, in the future, the main advantage of the utility is that the windows are constantly updated, allowing you to collect statistics, view average indicators, trends and change the quality of the measurements.

Since we are verifying the date with the server, we are called Saint(Sent packages) and Recv(Packages removed). If the meanings in these columns do not escape, it means that the connection with the knot has gone down. What work? Turn back to the proper technical trim.

Stovpets Loss additionally look at the dynamics of expenses in percentage terms.

The utility also allows you to copy text in manual formats ( .txtі .html) To clipboard ( Copy to clipboard) Abo to the okremium file ( Export).

Clicking on the intermediate node allows you to take additional information about it.

Important to know!

For details of the problem fahіvtsі techpіdtrimki can request additional ping with special settings. For whom it is enough to bring them in at the end Options, Let me tell you:

  1. Interval (sec)- data update hour in seconds.
  2. Max host in LRU list- maximum number of hosts (or IP address, as the option is not active) Resolve names) To the end point.
  3. Ping size (bytes) - ICMP packet size.
  4. Resolve names- ability to convert an IP address into a host name.

And what about Linux?

For OS of the Linux family, the utility is simply called MTR. If your operating system does not have it, you can install it in one of the following ways:

Debian/Ubuntu/Mint:

$ apt-get install mtr

CentOS/RedHat/Fedora:

$ Yum install mtr

MTR has the same functionality as Winmtr, as well as a similar graphical interface. You can run the utility with the command:

de X.X.X.X - IP address of end server or host name.

In this way, chirp like this:

  • Loss% - number of spent packets between the control computer and intermediate nodes.
  • SNT - total number of dispatched packages.

As soon as ten things have been ruined, the utility signals us about it, farbuyuchi vuzol in a red color and pіdrakhovyuchi vіdsotok vtrat.

Okremo means the ability to run the utility in text (console) mode. For whom to add the option -t or --curses:

mtr --curses site

Let's take a look at some more important MTR options, which can be very different in the diagnostics process.

R or --report

Starts the sound mode, in which MTR process the specified number of cycles (single option -c), and then display the statistics and automatically terminate the robot. This mode is coordinated for the collection of statistics about the quality of the measure.

C COUNT or --report-cycles COUNT

Specify the number of cycles after which MTR to complete the work.

P BYTES or --psize BYTES

Set the packet size in bytes.

I SECONDS or --interval SECONDS

Specify the interval between packets being managed.

N or --no-dns

Allows you not to override DNS, displaying node IP addresses.

A X.X.X.X or --address X.X.X.X

Allows you to specify the computer interface address from which ICMP requests will be handled.

Together

Understandably, the commands in the console give a more accurate result, the oscillators can be fixed one by one in the packets (short shavings), but Winmtr and MTR are more compact and more efficient in victories. And on what basis do you choose your choice, only you will win. :)

Axis, vlasne, and everyone who is guilty - z'yasuvali, scho robiti - tezh. :) Come on, the material is too dear to you, and if you have lost supplements near the clouds, apply to us for literacy.

On the Internet, on the forums, in times of vindication of problems with connections to some kind of node (), it is recommended to reverify the ping or viconate the route and in this way, reverify the availability of the server.

But what is ping and what is trasuvannya? Ping (ping) is a tool (utility) for rechecking the integrity of the data in the networks based on TCP / IP. Traceroute (traceroute or tracert command) is a program for designing data routes in TCP / IP networks.

However, it is not always possible to learn information about those, how the re-verification is itself: how to pinguvati or how to build a track.

Ping check

To re-verify ping, a single command is used ping, Yaku must be entered in the command line. Run the command line for the help of such actions:

Windows:

1) Start -> all programs -> standard -> Command row

2) Start -> viconati -> cmd

This OS has an impersonal terminal, so for these purposes it is possible to win whether it is installed on a PC. Call the standard terminal, you can run it using the same keys CTRL+ALT+T.

Also, to prop up the song server, you need to run the command:

Ping

For example, for ping addresses 11.222.33.44 it is necessary to enter the command:

Ping 11.222.33.44

Below is the butt of the results of pinging one of the IP addresses.

As you can see from the results, 4 packets with a size of 32 bytes were sent and received. An hour of exchange with one packet was 47 milliseconds.

Warto means that in Windows only 4 packages are charged for locking. In Linux, the exchange of packets is three until the end of the fir, until the koristuvach independently calls the process of obtaining the keys CTRL+C. To run ping in a similar way in Windows, you need to select the parameter -t. for example:

Ping -t 11.222.33.44

Zupinka exchange of packets is consummated by the same keys - CTRL+C.

Setting the number of dispatched packages

To set the maximum number of managed packages, you need to select a command like this:

Windows:

Ping-n<число_пакетов>

for example:

Ping -n 5 11.22.33.44

Ping -c<число_пакетов>

for example:

Ping -c 5 11.22.33.44

Changes in the expansion of the package

In order to ping the ping with the variant packets of the singful size (in bytes), it is necessary to vicariously enter the command:

Windows:

Ping -l<размер_пакетов>

for example:

Ping -l 64 11.22.33.44

Ping -s<размер_пакетов>

for example:

Ping -s 64 11.22.33.44

In this case, packets were edited with a size of 64 bytes.

Trasuvannya route can show the speed of passing packets between routers, how to connect a PC, where to go, and a terminal server.

For the victorious tracing, the following command is coming:

Windows:

Tracert

for example:

Tracert wikipedia.org

traceroute

for example:

Traceroute wikipedia.org

Varto indicates that for locking during routing, DNS query is also used to allow IP addresses in the domain name for skin passing through the router. This option can be turned on, in such a manner, by speeding up the time of taking away the results of the transfer.

In order to activate this option, it is necessary to select such a look of the command:

Windows:

Tracert-d

Traceroute -n

The robotic skin IT-specialist, who maintains the Internet connection channel, has the power and reliability of the services that Internet providers rely on. The main verification tool is the ping command.

For the sake of you, you know about the main methods of work with the team ping on Windows.

Let’s take a look at the words and apply the following commands:

To recheck the channel, we speed it up with the ping utility, which can be launched from the command line.

The launch of the command line is done through the Start button -> Vikonati (for windows), the position is written cmd and pressed on the Enter key. Looks like it's coming:

Proping (reviewing availability) whether you have an address on the Internet, for example, mail.ru:

For the lock, the ping utility sends 4 packets per address. In order to understand how to spend є on the channel, put the -t key:


In this manner, you can spend an hour on the canals zatrimki packages. You can interrupt the command at any time by pressing "ctrl C"

To send statistics to the ISP's technical support service, you need to save the results to a file. Run the ping command step by step:

ping mail.ru -t -w 10000> testmail.txt

Check the required hour of testing and press "ctrl C" to rewrite the record:

To read the statistics file, you may need to change the font in Notepad. It's simple - open the image in Notepad: Format -> Font and choose terminal.

Yak bachimo team ping even easier to work with!

Everyone knows the situation, if the Internet on the computer is unsupported, such behavior can be observed with the use of ADSL modems, Wifi in the UK, GSM and other similar non-advanced technologies. Shvidko z'yasuvati chi є on the computer Internet is possible for the help of the ping utility.

Ale, the area її zastosuvannya richer, її vikoristovuyut merezhі administratori to reverify the availability of a distant node in the region, it will be stagnant in different scripts and rich in other areas. In this article, we will look at the ping command in Linux, we will talk about how the utility works, how it works, we will look at options and possibilities.

The ping utility is an even simpler tool for diagnosing a network. It allows you to review the available remote hosts and everything. For which utility checks whether the host can be allowed to interrogate for the help of the ICMP protocol.

I am sure, it is not necessary to say that all data is transmitted as little as possible in seemingly small packets. The program sends a small packet with ICMP data and checks back the packet if it is accepted, then it is important that the remoteness of the available node is taken into account. ICMP or Internet Control Message Protocol - is superseded over the IP protocol, as it is victorious for the transmission of service announcements and acknowledgments and pardons.

The ICMP protocol can transmit only two types of packets - only notifications about pardons and drinking reminders. At my heart, reminding me to drink is divided into:

  • Awareness moon-zapit;
  • Announcement of the moon-wind.

Let's try to figure out what to rob the ping command. Also, if you send a ping to a remote node, the utility will set a unique identifier for the skin packet, as well as the TTL and hour of the packet. If the host is available, the time it takes to send a message, based on the time it takes the utility to calculate the hour it took the packet to go back. Let's fix the next package. In the county, the total amount of incoming and outgoing packages, the amount of expenses and other data is paid.

ping command

Now we have lost a little bit of practice. But before that, let's move on to practice, let's take a look at the syntax of the command and її options. The syntax is simple:

$ Ping options host_address

The format of the ping command is rather simple. As a host address, you can send both an ip address and a domain name. Options to adjust the behavior of the utility. Let's look at the main ones:

  • -4 - win only ipv4 (for locking);
  • -6 - win only ipv6;
  • -A- adaptive mode, the hour between packet administrations is adapted to the hour of transmission and reception of the packet, but not less than 200ms;
  • -b- allow ping a wide address;
  • -z- the number of packages, as needed;
  • -D- show the hour of the UNIX timestamp;
  • -f- flood mode, in which mode packets are transmitted without blockages, can be used to create DoS attacks on nearby nodes. Number of dots, how to display the utility indicates the number of used packages;
  • -i- interval in seconds between packet editing;
  • -I- vikoristovuvat tsey merezhevyy interface for vіdpravka paketsіv;
  • -l- the mode of re-wandering, it is run after a lot of packets and the system does not follow the same packets;
  • -n- don't take domain for ip address;
  • -r- Ignore the routing tables and send the packet to the specified interface;
  • -s- expansion of one package;
  • -t- insert TTL manually;
  • -v- more detailed visnovok.

Now that we have looked at the main parameters of the ping command and its syntax, it's time for practice, let's talk about how to ping the first node in Linux.

How to squirm Ping?

To reconsider the practicality of a measure, the ping program is often used to either a site, which is always available, for example, google.com or even simpler and shorter than ya.ru. It will be enough for you to pass the utility in the parameters to the address, you will know the ip yourself and complete everything you need:

As I wrote above, a unique identifier icmp_seq is displayed for the skin package, the number of nodes to the target node ttl і hour, the number of times for package delivery time. To ping ping press keys ctrl+c. In the end, the utility brought up the big statistics:

  • packets transmitted- sent packages;
  • received- otrimano packages;
  • packet loss- hundreds of used packages;
  • time- zagalno hour of work;
    rtt min/avg/max/mdev- minimum hour / middle hour / maximum hour / quadratic allowance.

If the ping command is not supported, then packets can be redirected for a long time, which creates an additional attack on the server and that is not a problem. You can immediately ask the team to collect a number of sent packages for the additional -c option:

In the same way, as we know how to ping a domain, you can enter an ip address without a middle. Tse allows you to rewrite chi є merezha if the DNS server is incorrectly set. for example:

ping -c 3 8.8.8.8

The offensive appearance of the ping correction, the ce ping flood. For the help of such packages, you can either test the channel's vanishing or turn off the Internet connection on one of the machines. Ale tsі functions can be vindicated only with the rights of a supercorrector. To organize a ping flood, specify the -f option:

ping -f site

For locking, in the normal mode, the leather offensive package is corrected, if it is removed from the front. Alternatively, you can set the interval between packet forwarding -i yourself:

ping -i 0.2 site

Here the ping program wins the ranks, tunes in the flood, you show how intensive it is to manage the packets. For the help of the -D option, you can use the Unix Timestamp for skin care:

ping -D site

visnovki

In this article, we looked at the ping command in linux, how to beat the main parameters and methods of pinging. This even simpler tool can be used to test the problems of the system and fix them. In this plan, the utility can become indispensable.

PING is the main Windows command line utility for rechecking connections in TCP/IP based mergers. The PING command, for additional help with the echo request over the ICMP protocol, checks the connection on the same IP protocol with a different computer that supports TCP / IP. After dermal transmission, follow up on a moon-watching basis.

Ping may be the most common TCP / IP command in the middle of Windows, as it is used to troubleshoot and re-verify the ability to access the Internet.

Ping command, run without parameters, show a final result. However, it works effectively on all versions of Windows, including Windows 10.

To re-verify the measure, you can also speed up with the commands:

  • TRACERT - showing the way to the point of recognition for the help of the moon-reminder;
  • PATHPING - gives information about spending data on intermediate nodes.

Syntax of parameters and important keys of the PING command

ping [-t] [-a] [-n qualifier] [-l range] [-f] [-i TTL] [-v type] [-r qualifier] [-s qualifier] [(-j hostlist | - k hostlist)] [-w interval] [target_computer_name], de

  • -t - Set the ping command to wake up with an echo request to the point of recognition until the end of the ping, until the command is interrupted. To restart the command and view statistics, press the CTRL-BREAK combination. To retry the ping command and exit from it, press the CTRL-C keys.
  • -a - Set the address of the return name by the recognition IP-address. At the times of a successful vikonannya, the name of a major node is displayed.
  • -n lichnik - Set the number of wake-up calls to be made with the moon-charge. For zamovchuvannyam - 4.
  • -l expand - Specify the length (in bytes) of the data fields in the remote control with moon-request. For locking - 32 bytes. Maximum expansion - 65527.
  • -f - Sets the correction of echo request with the “Don" t Fragment " flag in the IP header set to 1. The moon term notifications are not fragmented by routers on the way to the recognition site. data block for the channel (Maximum Transmission Unit).
  • -i TTL - Set the value of the TTL field in the IP header to remind you what to do with moon-request. The lock is taken from the TTL value specified for the lock for the node. For Windows XP nodes, set the value to one 128. The maximum TTL value is 255.
  • -v type - Set the value of the Type of Service (TOS) field in the IP header to help you understand what to do with the moon-request. For locking, the value is 0. type - tens of values ​​from 0 to 255.
  • -r lichnik - Set the Record Route parameter in the IP header to record the route by which moon-request notifications should be routed and how moon-void notifications should be routed. Skin transition to a higher cost parameter for recording the route. According to the possibility, the value of the lichnik is given equal or greater, the lower number of transitions between the dzherel and the city of recognition. The qualifier parameter can have a value from 1 to 9.
  • -s lichnik - Indicate the Internet Timestamp option in the IP header to record the hour of wake-up call and wake-up call for skin transition. The qualifier parameter may have a value from 1 to 4.
  • -j nodelist - Indicate for echo-requesting the choice of a valid routing parameter in the IP header with a set of intermediate recognition points, specified in the list_of_nodes. With free routing, the last intermediate points of recognition can be separated by one or more routers. The maximum number of addresses or names in the list of sites is 9. The list of sites is the number of IP addresses (in dotted-decimal notation), separated by spaces.
  • -k hostlist - Indicate for echo-requesting the use of the default routing parameter in the IP header with a set of intermediate recognition points, specified in the list_of_nodes. In the case of suvoro routing, an intermediate point of recognition is due to be available without intermediary (it is due to the external in the router interface). The maximum number of addresses or names in the list of sites is one 9. The list of sites is the number of IP-addresses (in dot-decimal notation), separated by spaces.
  • -w interval - Indicates in milliseconds the hour of ochіkuvannya otrimannya z moon-vіdpovіddu, yake vіdpovіdaє podomlennyam z echo-request. If no one has been notified of the moon-seeing at the borders of a given interval, then it seems that there is a notification about the "Request timed out" pardon. The interval for locking up is 4000 (4 seconds).
  • target_computer_name - Sets the point of recognition, identified by IP-address or node name.

Apply the ping command

  • To display finalization in the command line, enter the command: ping /?;
  • To check the re-verification of the ya.ru address before attaching, manually enter: ping ya.ru -t;
  • To edit an ICMP connection to the 192.168.1.1 acknowledgment point and acknowledgment to node names, enter: ping -a 192.168.1.1;
  • To edit the 10.0.99.221 luna-charge notification to address 10.0.99.221 ten luna-charge messages, each may have a data field of 1000 bytes, enter: ping -n 10 -l 1000 10.0.99.221;
  • To correct the notification of the moon-powered points of recognition 10.0.99.221 and record the route for 4 transitions, enter: ping -r 4 10.0.99.221;
  • To edit moon-received notification to address 10.0.99.221 and set free routing for recognition points 10.12.0.1-10.29.3.1-10.1.44.1 enter: ping -j 10.12.0.1 10.29.3.1 10.1.44.1 10.0.99.221.

Video - How to use the PING utility