The tracert Command is used for triggering a diagnostic utility that determines the route of the traffic in the network. This program is present in most modern operating systems. Utility is used mainly for testing and identifying problem areas in the network.
Tracert sends to the destination requests like ping. Noticing that the user typed the tracert command, Windows sends specially marked packets that reach the first gateway back to the user's computer. At the same time in the received data contains information about the node that returned it. Then it sends the following request in the body which is already an indication to skip to the previous gateway.
Serial sending packages to get the full route information from the user's computer to any host on the Internet or local network. Thus, the tracert command is a necessary tool for diagnosing problems, enabling identification of the plot on which packets are lost.
To Start the utility check network route in Windows from the command line. In the operating system versions below 8 to open the command line interface, just click “start-Run”, and type cmd. Windows 8 will have to access the menu “All programs” and find the entry for “Command prompt”. In any version of the OS you can also use the key combination Win+R.
Recommended
How to get out of "Skype" on the "Android" and not only
How to get out of "Skype" "Android"? This question bothers many users. The thing is that the messenger is not so difficult. But there are features that are only for mobile versions. To log out of Skype in this case more difficult than it seems. But i...
Kingo ROOT: how to use the program to gain administrative rights on Android
The Gadgets on the platform Android regained the lion's share of the market. Developers are continually perfecting the OS, trying to fit the needs of the users, but from year to year admit palpable mistake: forbid the owner to "stuffing" of his gadge...
How to get from Stormwind to Tanaris: practical tips
World of Warcraft is an iconic MMORPG, uniting millions of players around the world. There are many locations and puzzles, secret trails and larger, but rather dangerous paths. Sooner or later, every player chose the side of the Alliance, we have to ...
Once in the command prompt, enter tracert domen.ru where is domen.ru you can specify any domain name or IP address. This will launch the utility with the default settings.
Running an advanced user, contains the tracert command key descriptions. You can call it just by typing in the command tracert with the -? parameter.
Here is a short description of the parameters supported by the tracert command:
By default, the maximum number of hops is limited to 30, and the wait time is 4 seconds.
The Users of Linux operating system available utility with greater functionality than does the tracert command. It is called traceroute. This application differs from analog for Windows the presence of a variety of modes that are set using parameters.
Run a trace using ICMP carries the team tracertroute key –I. pay attention that this operation requires administrator permissions. With the standard settings in most distributions running the command tracertroute can be carried out by any user. In this case, it will use UDP packets, you can also force the utility to specify to use them with the parameter –U.
Very often the tracert command or equivalent for Linux in some places instead of the output information about the response of the host stars. You should not see this as a mistake. This means only one thing: a particular router did not respond to a request for a predetermined period of time. Nothing wrong with that, as the reasons can be a lot. One of them – the installation of a firewall or other protection that blocks the passage of certain packets.
Tracert - a command, which is very important in diagnosing network problems. But you should consider that to be wrong, considering the output of the tracert command, simply. So no need to use trace routes as the only means of Troubleshooting.
Another reason that the trace can only indirectly indicate the problem is the difference in the routes the packets take in the Internet in different direction. Typically, a packet sent by the user before the server goes through some nodes and sent back - completely different.
Delay the packets present in the output of utilities tracert or traceroute, and have nothing to do with delays for transit packets. This is because the nature of their processing on the router. So to target them you need to be able to correctly read the command output that is quite difficult.
The MTR Program exists in versions for most operating systems. Its principle of operation is very similar to tracer (traceroute). She queries the specified node for a specified period of time, thus allowing you to commit the changes of the delays.
The utility Version for Windows is called WinMTR and distributed free of charge.
The User is given the opportunity to work with a graphical interface where you must specify the IP address or domain of the destination node to start collectingstatistics. Typically, analysis is necessary to send at least 100 packets.
Linux Users also have MTR installed separately from repositories. These operating systems typically use the console version. Available to the user a variety of options that allow you to specify the number of packets sent, the write report to a file, a timeout. Also a version for Linux can use to test specific ports or TCP packets.
The server Administrator or the provider, as a rule, it is better to send the findings of the tracert command (traceroute), ping, and report utility MTR. You can certainly try to do just the latter, but the more information provided, the easier it is for the technician to find and fix the problem.
Article in other languages:
AR: https://tostpost.com/ar/computers/18899-tracert.html
HI: https://tostpost.com/hi/computers/20588-tracert.html
JA: https://tostpost.com/ja/computers/18548-tracert.html
TR: https://tostpost.com/tr/bilgisayarlar/32789-tracert-komutu-yard-mc-tan-ileti-im-sorunlar.html
Alin Trodden - author of the article, editor
"Hi, I'm Alin Trodden. I write texts, read books, and look for impressions. And I'm not bad at telling you about it. I am always happy to participate in interesting projects."
Related News
Remove drivers AMD: a few simple methods
Probably many PC users know that when you replace one graphics card to another even if they are built on the chipset, same manufacturer, old drivers for the correct operation of the new device need to uninstall, because of possibl...
"Windows 8": reviews of users and programmers. The pros and cons of Windows 8
Not long ago released a new operating system from Microsoft, and it was named “Windows 8”. Of course, many advanced users have decided to explore this wonderful operating system. “Windows 8” can be used bot...
Where to dig the school collection in "Zombie farm": tips
"Zombie farm" is an exciting browser game. Unlike many projects, where the gamer on the side of good fights hordes of zombies in this story everything is different. The player needs to take care of your game character, which is it...
"Easy roller" - what does this sentence mean?
After computer games went beyond personal computers and players ' rooms and provided the opportunity to play on the network, many people rushed to test their strength in confrontation with each other. Because you have to understan...
Drives external for computer and laptop
Likely, some time ago a device such as external drives, it would be possible to confuse a lot of a geek. Because often the fact of the presence of the CD drive inside the PC case automatically makes the device “elite”:...
Data backup is a guarantee of safety of the information
data Backup is very important, and this applies particularly to business. Indeed, in the case of loss of information and without the possibility of its rapid recovery, the owners can incur large losses. Every year around the world...
Comments (0)
This article has no comment, be the first!