In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-31 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Development >
Share
Shulou(Shulou.com)06/03 Report--
This article introduces the relevant knowledge of "sorting out common network-related commands under DOS". In the operation of actual cases, many people will encounter such a dilemma, so let the editor lead you to learn how to deal with these situations. I hope you can read it carefully and be able to achieve something!
Arp
Displays and modifies the IP or token Ring physical address translation table to Ethernet used by address Resolution Protocol (ARP). This command is available only after the TCP/IP protocol is installed.
Arp-a [inet_addr] [- N [if_addr]]
Arp-d inet_addr [if_addr]
Arp-s inet_addr ether_addr [if_addr]
Parameters.
-a
Displays the current ARP entry by asking TCP/IP. If inet_addr is specified, only the IP and physical address of the specified computer are displayed.
-g
Same as-a.
Inet_addr
Specify the IP address with a dotted decimal mark.
-N
Displays the ARP entry for the network interface specified by if_addr.
If_addr
Specify the IP address, if any, whose address translation table interface needs to be modified. If it does not exist, the first applicable interface is used.
-d
Deletes the item specified by inet_addr.
S
Add an entry to the ARP cache to associate the IP address inet_addr with the physical address ether_addr. The physical address is given by six hexadecimal bytes separated by a hyphen. Use dotted decimal tags to specify the IP address. The item is permanent, that is, it is automatically deleted from the cache after the timeout expires.
Ether_addr
Specify the physical address.
Finger
Displays information about the user on the specified system running the Finger service. Output different variables according to the remote system. This command is available only after the TCP/IP protocol is installed.
Finger [- l] [user] @ computer [...]
Parameters.
-l
Displays information in a long list format.
User
Specify the user to get the relevant information. Omit the user parameter to display information for all users on the specified computer:
@ computer
Ftp
Transfer files to or from a remote computer that is running the FTP service (sometimes called daemon). Ftp can be used interactively. Click ftp commands in the related topics list for a description of the available ftp subcommands. This command is available only after the TCP/IP protocol is installed. Ftp is a service that, once started, creates a subenvironment in which you can use the ftp command, and you can return to the Windows 2000 command prompt from the subenvironment by typing the quit subcommand.
When the ftp subenvironment is running, it is represented by the ftp command prompt.
Ftp [- v] [- n] [- I] [- d] [- g] [- s:filename] [- a] [- w:windowsize] [computer]
Parameters.
-v
Suppresses the display of remote server responses.
-n
Disable automatic login to the initial connection.
-I
Turn off interactive prompts when multiple files are transferred.
-d
Enables debugging and displays all ftp commands passed between the client and the server.
-g
Disables the filename group, which allows the use of wildcard characters (* and?) in local files and pathnames. (see the glob command in the online Command reference. )
-s: filename
Specify the text file that contains the ftp commands; when ftp starts, these commands run automatically. Spaces are not allowed in this parameter. Use this switch instead of redirection (>).
-a
Use any local interface when bundling a data connection.
-w:windowsize
Replaces the transfer buffer with a default size of 4096.
Computer
Specify the computer name or IP address to connect to the remote computer. If specified, the computer must be the last parameter of the line.
Nbtstat
This diagnostic command uses NBT (NetBIOS on TCP/IP) to display protocol statistics and current TCP/IP connections. This command is available only after the TCP/IP protocol is installed.
Nbtstat [- a remotename] [- An IP address] [- c] [- n] [- R] [- r] [- S] [- s] [interval]
Parameters.
-a remotename
Lists the name table of the remote computer using its name.
-An IP address
Use the IP address of the remote computer and list the names.
-c
Give the IP address of each name and list the contents of the NetBIOS name cache.
-n
Lists the local NetBIOS name. Registered indicates that the name has been registered by broadcast (Bnode) or WINS (other node types).
-R
After clearing all names from the NetBIOS name cache, reload the Lmhosts file.
-r
Lists name resolution statistics for Windows network name resolution. On Windows 2000 computers configured to use WINS, this option returns the number of names to be resolved and registered by broadcast or WINS.
-S
Displays client and server sessions, listing remote computers by IP address only.
S
Displays client and server sessions. Try to convert the IP address of the remote computer to a name that uses the host file.
Interval
Redisplays the selected statistics, pausing interval seconds between each display. Press CTRL+C to stop redisplaying statistics. If this parameter is omitted, nbtstat prints the current configuration information once.
Netstat
Displays protocol statistics and current TCP/IP network connections. This command can only be used if the TCP/IP protocol is installed.
Netstat [- a] [- e] [- n] [- s] [- p protocol] [- r] [interval]
Parameters.
-a
Displays all connection and listening ports. Server connections are usually not displayed.
-e
Displays Ethernet statistics. This parameter can be used in conjunction with the-s option.
-n
Displays the address and port number in numeric format (instead of trying to find the name).
S
Displays statistics for each protocol. By default, statistics for TCP, UDP, ICMP, and IP are displayed. The-p option can be used to specify the default subset.
-p protocol
Displays the connection to the protocol specified by protocol; the protocol can be tcp or udp. If used with the-s option to display statistics for each protocol, protocol can be tcp, udp, icmp, or ip.
-r
Displays the contents of the routing table.
Interval
Redisplays the selected statistics, pausing interval seconds between each display. Press CTRL+B to stop redisplaying statistics. If this parameter is omitted, netstat prints the current configuration information once.
Ping
Verify the connection to the remote computer. This command can only be used if the TCP/IP protocol is installed.
Ping [- t] [- a] [- n count] [- l length] [- f] [- I ttl] [- v tos] [- r count] [- s count] [[- j computer-list] | [- k computer-list]] [- w timeout] destination-list
Parameters.
-t
The computer specified by Ping until interrupted.
-a
Resolve the address to the computer name.
-n count
Sends the number of ECHO packets specified by count. The default value is 4.
-l length
Sends an ECHO packet containing the amount of data specified by length. The default is 32 bytes; the maximum is 65527.
-f
Send the "do not segment" flag in the packet. The packet is not segmented by the gateway on the route.
-I ttl
Set the time to Live field to the value specified by ttl.
-v tos
Set the Service Type field to the value specified by tos.
-r count
Record the routes of outgoing and return packets in the record Route field. Count can specify at least 1 computer and up to 1 computer.
Specify the remote computer to ping.
Rcp
Copy files between the Windows 2000 computer and the system running the remote shell port monitor rshd. The rcp command is a connection command that can also be used for other transfers to copy files between two computers running rshd when issued from a Windows 2000 computer. The rshd port monitor can be used on UNIX computers, but not on Windows 2000, so Windows 2000 computers can only participate as the system that issues commands. The remote computer must also provide the rcp utility by running rshd.
Rcp [- a |-b] [- h] [- r] source1 source2... SourceN destination
Parameters.
-a
Specifies the ASCII transfer mode. This mode converts carriage return / newline characters to carriage returns on outgoing files and to carriage return / newline characters in incoming files. This mode is the default transport mode.
-b
Specifies the binary image transfer mode. Carriage return / newline conversion was not performed.
-h
Transfer source files marked as hidden attributes on your Windows 2000 computer. Without this option, specifying a hidden file on the rcp command line has the same effect as if the file does not exist.
-r
Recursively copies the contents of all subdirectories of the source to the destination. Both source and destination must be directories, although using-r works even if the source is not a directory. But there will be no recursion.
Source and destination
The format must be [computer [.user]:] filename. If you omit the [computer [.user]:] section, the computer is assumed to be the local computer. If the [.user] section is omitted, the Windows 2000 username currently logged in will be used. If a fully qualified computer name is used, it contains a period (.) Delimiter, you must include [.user]. Otherwise, the last part of the computer name is interpreted as the user name. If more than one source file is specified, the destination must be a directory.
If the file name does not start with the forward slash (/) of UNIX or the backslash (\) of Windows 2000 systems, it is assumed to be relative to the current working directory. In Windows 2000, this is the directory where commands are issued. On a remote system, this is the login directory of the remote user. Period (.) Represents the current directory. Use escape characters (\, "or') in the remote path to use wildcards on the remote computer.
Rexec
Run the command on a remote computer running the REXEC service. The rexec command validates the user name on the remote computer before executing the specified command, and cannot be used until the TCP/IP protocol is installed.
Rexec computer [- l username] [- n] command
Parameters.
Computer
Specify the remote computer on which to run command.
-l username
Specifies the user name on the remote computer.
-r
Redirect the input from rexec to NULL.
Command
Specify the command to run.
Route
Controls the network routing table. This command can only be used if the TCP/IP protocol is installed.
Route [- f] [- p] [command [destination] [mask subnetmask] [gateway] [metric costmetric]]
Parameters.
-f
Clear the routing table for all gateway entrances. If this parameter is used in combination with a command, the routing table is cleared before running the command.
-p
This parameter, when used with the add command, persists the route between system bootstrappers. By default, routes are not retained when the system reboots. Displays a list of registered persistent routes when used with the print command. Ignore all other commands that always affect the corresponding persistent route.
Command
Specify one of the following commands.
Purpose of command
Print print Route
Add add Route
Delete delete route
Change changes an existing route
Destination
Specify the computer on which to send the command.
Mask subnetmask
Specifies the subnet mask associated with the route entry. If not specified, 255.255.255.255 is used.
Gateway
Specify the gateway.
The symbolic names used by all destination or gateway are referenced in both the network database file named Networks and the computer name database file named Hosts. If the command is print or delete, the destination and gateway can also use wildcards or omit gateway parameters.
Metric costmetric
Assign integer hops (from 1 to 9999) to use when calculating the fastest, most reliable, and / or cheapest routes.
Rsh
Run the command on a remote computer running the RSH service. This command can only be used if the TCP/IP protocol is installed.
Rsh computer [- l username] [- n] command
Parameters.
Computer
Specifies the remote computer running command.
-l username
Specifies the user name to use on the remote computer. If omitted, the user name of the login is used.
-n
Redirect the input from rsh to NULL.
Command
Specify the command to run.
Tftp
Transfer files to or from a remote computer that is running the TFTP service. This command can only be used if the TCP/IP protocol is installed.
Tftp [- I] computer [get | put] source [destination]
Parameters.
-I
Specifies the binary image transfer mode (also known as octet). In binary image mode, the file is moved byte by byte. Use this mode when transferring binaries.
If-I is omitted, the file will be transferred in ASCII mode. This is the default transport mode. This mode converts EOL characters to carriage returns for UNIX and carriage returns / line feeds for personal computers. This mode should be used when transferring text files. If the file transfer is successful, the data transfer rate is displayed.
Computer
Specify a local or remote computer.
Put
Transfer the file destination on the local computer to the file source on the remote computer.
Get
Transfer the file destination on the remote computer to the file source on the local computer.
If you transfer the file file-two on the local computer to the file file-one on the remote computer, specify put. If you transfer the file file-two on the remote computer to the file file-one on the remote computer, specify get.
Because the tftp protocol does not support user authentication, the user must log in and the file must be writable on the remote computer.
Source
Specifies the file to be transferred. If the local file is specified as -, the remote file is printed on stdout (if obtained) or read from stdin (if placed).
Destination
Specifies the location to which the file is transferred. If destination is omitted, the same name as source is assumed.
Tracert
The diagnostic utility sends Internet Control message Protocol (ICMP) echo packets with different time-to-live (TTL) values to the destination to determine the route to reach the destination. To decrement at least 1 before forwarding the TTL on the packet, each router on the path is required, so TTL is a valid hop count. When the TTL on the packet reaches 0, the router should send the message "ICMP timed out" back to the source system. Tracert first sends an echo packet with a TTL of 1, and increments the TTL by 1 in each subsequent transmission until the destination response or TTL reaches the maximum value to determine the route. The route determines the route by examining the "ICMP timed out" message sent back by the intermediate router. However, some routers quietly upload packets containing expired TTL values that tracert cannot see.
Tracert [- d] [- h maximum_hops] [- j computer-list] [- w timeout] target_name
Parameters.
/ d
Specifies that the address is not resolved to the computer name.
-h maximum_hops
Specifies the maximum number of hops for the search target.
-j computer-list
Specifies a sparse source route along the computer-list.
-w timeout
The number of microseconds to wait for each reply specified by timeout.
Target_name
The name of the target computer.
In addition, there are IPCONFIG,DNR and other commands, which will not be introduced here.
This is the end of the content of "sorting out common network-related commands under DOS". Thank you for your reading. If you want to know more about the industry, you can follow the website, the editor will output more high-quality practical articles for you!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.