Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Tracertroute principle

2025-04-04 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

tracert is a common network command used to track each hop information of a packet arriving at its destination

Common tracert command format:

tracert [-d] [-h maximum_hops] [-j computer-list] [-w timeout] target_name

Detailed parameters:

-d

Specifies that addresses are not resolved to computer names.

-h maximum_hops

Specifies the maximum number of hops for the search target.

-j computer-list

Specifies sparse source routing along the computer-list.

-w timeout

The specified number of microseconds to wait for timeout per reply.

target_name

The name of the target computer.

Tracert Principle:

Tracert determines the route by sending a response packet with TTL 1 and incrementing TTL by 1 each time it is sent until the destination response or TTL reaches its maximum value. Determine the route by examining the ICMP timed out message sent back by the intermediate router.

Tracert determines the route taken to the target by sending Internet Control Message Protocol (ICMP) reply packets with different IP Time to Live (TTL) values to the target. Require each router on the path to decrement the TTL on the packet by at least 1 before forwarding the packet. When the TTL on the packet decreases to 0, the router should send an ICMP timed out message back to the source system.

The tracert command is commonly used to determine where a packet stops on the network, and can also be used to check for loops in the network

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report