Solved

ARP, PING, and TRACERT.

Posted on 2000-02-20
2
196 Views
Last Modified: 2013-12-23
What are these commands used for? When would you use them and what switches come with them?
0
Comment
Question by:Bjerky
2 Comments
 
LVL 9

Accepted Solution

by:
TooKoolKris earned 100 total points
ID: 2540575
ARP is used to gather hardware addresses of local hosts and your default gateway. It resolves IP addresses into MAC addresses and puts them into a cache. When you try to communicate with a machine that doesn't resolve on the local subnet it will ARP for the gateway address and send the packet to the router to find where it should go. ARP /? at a DOS prompt will give you the switches.

PING is used to verify connections between hosts by sending ICMP echo packets to the specified address. It basicly used to see if a machine or anything with an IP is awake or online on the network. PING /? at a DOS promt for the switches.

TRACERT is a reporting utility that sends ICMP echo requests to an IP address and reports ICMP errors that are returned. It also produces a report that list all of the routers crossed in the process. TRACERT /? for switches!
0
 

Author Comment

by:Bjerky
ID: 2541068
Thanks!
0

Featured Post

Superior storage. Superior surveillance.

WD Purple drives are built for 24/7, always-on, high-definition security systems. With support for up to 8 hard drives and 32 cameras, WD Purple drives are optimized for surveillance.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
This is the first one of a series of articles I’ll be writing to address technical issues that are always referred to as network problems. The network boundaries have changed, therefore having an understanding of how each piece in the network  puzzl…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…

947 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now