Which of the following is used to verify whether another host on a Transmission Control protocol Internet Protocol network is reachable?

For a Microsoft Windows 2000 version of this article, see 162326.

Summary

This article describes TRACERT [Trace Route], a command-line utility that you can use to trace the path that an Internet Protocol [IP] packet takes to its destination.

This article discusses the following topics:

  • How to Use the TRACERT Utility

  • How to Use TRACERT to Troubleshoot

  • How to Use TRACERT Options

More Information

How to Use the TRACERT Utility

The TRACERT diagnostic utility determines the route to a destination by sending Internet Control Message Protocol [ICMP] echo packets to the destination. In these packets, TRACERT uses varying IP Time-To-Live [TTL] values. Because each router along the path is required to decrement the packet's TTL by at least 1 before forwarding the packet, the TTL is effectively a hop counter. When the TTL on a packet reaches zero [0], the router sends an ICMP "Time Exceeded" message back to the source computer.

TRACERT sends the first echo packet with a TTL of 1 and increments the TTL by 1 on each subsequent transmission, until the destination responds or until the maximum TTL is reached. The ICMP "Time Exceeded" messages that intermediate routers send back show the route. Note however that some routers silently drop packets that have expired TTLs, and these packets are invisible to TRACERT.

TRACERT prints out an ordered list of the intermediate routers that return ICMP "Time Exceeded" messages. Using the -d option with the tracert command instructs TRACERT not to perform a DNS lookup on each IP address, so that TRACERT reports the IP address of the near-side interface of the routers.

In the following example of the tracert command and its output, the packet travels through two routers [157.54.48.1 and 11.1.0.67] to get to host 11.1.0.1. In this example, the default gateway is 157.54.48.1 and the IP address of the router on the 11.1.0.0 network is at 11.1.0.67.

The command:

C:\>tracert 11.1.0.1
The output from the command:

Tracing route to 11.1.0.1 over a maximum of 30 hops
---------------------------------------------------
1 2 ms 3 ms 2 ms 157.54.48.1
2 75 ms 83 ms 88 ms 11.1.0.67
3 73 ms 79 ms 93 ms 11.1.0.1

Trace complete.

How to Use TRACERT to Troubleshoot

You can use TRACERT to find out where a packet stopped on the network. In the following example, the default gateway has found that there is no valid path for the host on 22.110.0.1. Probably, either the router has a configuration problem, or the 22.110.0.0 network does not exist, reflecting a bad IP address.

The command:

C:\>tracert 22.110.0.1
The output from the command:

Tracing route to 22.110.0.1 over a maximum of 30 hops
-----------------------------------------------------
1 157.54.48.1 reports: Destination net unreachable.

Trace complete.
TRACERT is useful for troubleshooting large networks where several paths can lead to the same point or where many intermediate components [routers or bridges] are involved.

How to Use TRACERT Options

There are several command-line options that you can use with TRACERT, although the options are not usually necessary for standard troubleshooting.

The following example of command syntax shows all of the possible options:

tracert -d -h maximum_hops -j host-list -w timeout target_hostWhat the parameters do:

-d
Specifies to not resolve addresses to host names

-h maximum_hops
Specifies the maximum number of hops to search for the target

-j host-list
Specifies loose source route along the host-list

-w timeout
Waits the number of milliseconds specified by timeout for each
reply

target_host
Specifies the name or IP address of the target host

Need more help?

What is a ping?

A ping [Packet Internet or Inter-Network Groper] is a basic Internet program that allows a user to test and verify if a particular destination IP address exists and can accept requests in computer network administration. The acronym was contrived to match the submariners' term for the sound of a returned sonar pulse.

Ping is also used diagnostically to ensure that a host computer the user is trying to reach is operating. Any operating system [OS] with networking capability, including most embedded network administration software, can use ping.

For example, to find the dot address, such as 205.245.172.72, for any given domain name, Windows users can go to the command prompt screen [start/run/cmd] and enter ping xxxxx.yyy, where xxxxx is the second-level domain name, like "whatis," and yyy is the top-level domain name, like "com."

Ping is a simple way to check for a response from a host.

Ping on a speed test

The term is also used to test and determine how fast a data signal travels from one place, like a computer, to another, like a website. Ping is also used to troubleshoot and test connectivity and determine response time.

How does ping work?

Ping works by sending an Internet Control Message Protocol [ICMP] Echo Request to a specified interface on the network and waiting for a reply. When a ping command is issued, a ping signal is sent to a specified address. When the target host receives the echo request, it responds by sending an echo reply packet.

This approach serves two specific purposes: verifying that the target host is available and determining round-trip time [RTT] or latency.

RTT is a measure of how long it took to receive a response. Measured in milliseconds [ms], the process starts when a browser sends a request to a server and is completed when a response from the server is received. RTT is a key performance metric of web applications.

By default, ping commands send multiple requests -- usually four or five -- and display the results. The echo ping results show whether a particular request received a successful response. It also includes the number of bytes received and the time it took to receive a reply or the time-to-live.

With pinging, a target host receives an echo request to which it responds by sending an echo reply packet.

How to use ping in troubleshooting?

Echo requests and echo responses form the standard for troubleshooting ICMP messages. Virtually every OS with network support includes ping for troubleshooting purposes. However, the exact implementation varies slightly among manufacturers.

Ping is the cornerstone of standard network troubleshooting. For example, an IP address can be pinged by typing in 172.168.9.13. If the ping is successful, it means that it is on, and the two machines can talk to each other.

However, if the ping is successful but the response time is long, it indicates network congestion, routing or speed issues. Even pings that are unsuccessful offer valuable troubleshooting information. When it comes to network speed tests, ping is the standard.

At its most basic, ping can run with just a ping command and a destination, such as the name or address of a remote host. Since ping is used as a command-line utility, it is easy to use in a variety of scripts. An administrator can run multiple pings, record how they were used and place the output of ping commands into a text file for later review.

What is ping spoofing?

In network security, ping spoofing involves threat actors who send fake information to a server. When this happens, the false data appears, acts like the original data packets and is transmitted to the server.

The receiver gets fake data and responds to the data packet with a third-party user instead of the original sender. On the receiver side, the server may receive unrequested data from the different address.

This helps hide the actual third-party user's address. Ping spoofing is difficult to detect.

What is ping in gaming?

Ping is also useful for online gaming. It measures the time it takes for the signal to transmit from a computer or console to a server.

Measured in milliseconds, a ping rate over 150 ms generates noticeable lag that impacts gameplay. Professional gamers consider a ping rate under 50 ms to be ideal.

Ping in Discord

In Discord -- a chat and video app used mostly by gamers -- a ping is a notification, most often on a smartphone or personal computer. When someone sends a ping, it pops up on the phone screen or desktop application.

This was last updated in July 2021

Continue Reading About ping

  • Network performance metrics pose data center challenges
  • Network device discovery best practices -- other than ping sweeps
  • How to check for packet loss to manage call quality
  • How to improve network latency in 3 steps
  • Perform a network health check with network testing

Dig Deeper on Network management and monitoring

  • Troubleshoot name resolution on Windows, Linux and macOS

    By: Damon Garn

  • data latency

    By: Kinza Yasar

  • jitter

    By: Linda Rosencrance

  • ping sweep [ICMP sweep]

    By: Katie Terrell Hanna

Which of the following is used in IP networks to test the reachability of a network device?

Answer. Ping is a network utility that is used to test if a host is reachable over a network or over the Internet by using the Internet Control Message Protocol “ICMP”.

Which of the following can be used to verify that the TCP IP protocol?

Use the Ipconfig tool to verify that the TCP/IP configuration has been initialized. Use the Ping tool with the loopback address [ping 127.0. 0.1] to verify that TCP/IP is correctly installed and bound to your network adapter card.

Which utility should be run to verify that your Windows client is configured to use the correct DNS server?

Run ipconfig /all at a command prompt, and verify the IP address, subnet mask, and default gateway. Check whether the DNS server is authoritative for the name that is being looked up.

What type of delivery method uses an email server between the sender and receiver of messages?

The Simple Mail Transfer Protocol [SMTP] is used to deliver e-mail messages over the Internet. This protocol is used by most e-mail clients to deliver messages to the server, and is also used by servers to forward messages to their final destination.

Chủ Đề