SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Forensic Science Informatics Unit 37 M4, D4
Ping  and tracert BTEOTSSBAT use the ping and tracert command
M4  calculate and record the time for a packet of data to reach five different IP addresses using the ping command. D4  determine and record the route of a packet to reach five different IP addresses using the tracert command.
A  ping  is the name of the process that tests whether a particular host (typically at an IP address) is accessible. It tests the network. It measures the time taken to reach the host and back again.  A  tracert  is the name of the process that tests the network infrastructure. It traces the route and time a packet of information takes to reach its destination Both use the  command prompt
To run the  ping  and  tracert  command Click on  start  and then  R un..
This box will pop up. Type cmd and then enter
A DOS box will appear
To do a  ping  Type at C:gt; ping 10.1.1.6 Where  10.1.1.6  is the IP address
To do a  tracert Type at C:gt; t r acert  10.1.1.6 Where  10.1.1.6  is the IP address

Weitere ähnliche Inhalte

Was ist angesagt? (18)

ip_spoofing.pdf
ip_spoofing.pdfip_spoofing.pdf
ip_spoofing.pdf
 
Itep
ItepItep
Itep
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanning
 
IPsec Basics: AH and ESP Explained
IPsec Basics: AH and ESP ExplainedIPsec Basics: AH and ESP Explained
IPsec Basics: AH and ESP Explained
 
Port Scanning
Port ScanningPort Scanning
Port Scanning
 
At610 shared by voip.com.vn
At610 shared by voip.com.vnAt610 shared by voip.com.vn
At610 shared by voip.com.vn
 
Icmp
IcmpIcmp
Icmp
 
Chap 28 security
Chap 28 securityChap 28 security
Chap 28 security
 
IPV4_IPV6_INTEROPERABILITY_
IPV4_IPV6_INTEROPERABILITY_IPV4_IPV6_INTEROPERABILITY_
IPV4_IPV6_INTEROPERABILITY_
 
Ip and icmp
Ip and icmpIp and icmp
Ip and icmp
 
Dcn (transmission control protocol) ppt
Dcn  (transmission control protocol) pptDcn  (transmission control protocol) ppt
Dcn (transmission control protocol) ppt
 
ICMPV4
ICMPV4ICMPV4
ICMPV4
 
Icmp V4 And Icmp V6
Icmp V4 And Icmp V6Icmp V4 And Icmp V6
Icmp V4 And Icmp V6
 
Socket programming
Socket programming Socket programming
Socket programming
 
Networking lab
Networking labNetworking lab
Networking lab
 
AWS re:Invent 2018 notes
AWS re:Invent 2018 notesAWS re:Invent 2018 notes
AWS re:Invent 2018 notes
 
Ch09
Ch09Ch09
Ch09
 
C Cpres
C CpresC Cpres
C Cpres
 

Ähnlich wie Ping Tracert

CSS L17 - DOS COMMANDS IN COMPUTER NETWORKING
CSS L17 - DOS COMMANDS IN COMPUTER NETWORKINGCSS L17 - DOS COMMANDS IN COMPUTER NETWORKING
CSS L17 - DOS COMMANDS IN COMPUTER NETWORKINGMarvin Bronoso
 
Networking session-4-final by aravind.R
Networking session-4-final by aravind.RNetworking session-4-final by aravind.R
Networking session-4-final by aravind.RNavaneethan Naveen
 
Command.pptx presentation
Command.pptx presentationCommand.pptx presentation
Command.pptx presentationAkshay193557
 
Information gathering using windows command line utility
Information gathering using windows command line utilityInformation gathering using windows command line utility
Information gathering using windows command line utilityVishal Kumar
 
Commands used in Assessing Network layout & Security
Commands used in Assessing Network layout & SecurityCommands used in Assessing Network layout & Security
Commands used in Assessing Network layout & SecurityLearningwithRayYT
 
Traceroute- A Networking Tool
Traceroute- A Networking ToolTraceroute- A Networking Tool
Traceroute- A Networking ToolAmit Kumar
 
CCNA Interview.pdf
CCNA Interview.pdfCCNA Interview.pdf
CCNA Interview.pdfhoang971
 
Hacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria GrunickHacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria Grunickamiable_indian
 
01204427-scanner.ppt
01204427-scanner.ppt01204427-scanner.ppt
01204427-scanner.pptVarunBehere1
 
Node finder presentation
Node finder presentationNode finder presentation
Node finder presentationVarun Varshney
 
Group Apres
Group ApresGroup Apres
Group Apresramya5a
 
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdfBIT DURG
 
PACKET Sniffer IMPLEMENTATION
PACKET Sniffer IMPLEMENTATIONPACKET Sniffer IMPLEMENTATION
PACKET Sniffer IMPLEMENTATIONGoutham Royal
 
Transport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP PortTransport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP PortNetwax Lab
 

Ähnlich wie Ping Tracert (20)

CSS L17 - DOS COMMANDS IN COMPUTER NETWORKING
CSS L17 - DOS COMMANDS IN COMPUTER NETWORKINGCSS L17 - DOS COMMANDS IN COMPUTER NETWORKING
CSS L17 - DOS COMMANDS IN COMPUTER NETWORKING
 
Commands.pptx
Commands.pptxCommands.pptx
Commands.pptx
 
Networking session-4-final by aravind.R
Networking session-4-final by aravind.RNetworking session-4-final by aravind.R
Networking session-4-final by aravind.R
 
QSpiders - Upper layer-protocols
QSpiders - Upper layer-protocolsQSpiders - Upper layer-protocols
QSpiders - Upper layer-protocols
 
Command.pptx presentation
Command.pptx presentationCommand.pptx presentation
Command.pptx presentation
 
Information gathering using windows command line utility
Information gathering using windows command line utilityInformation gathering using windows command line utility
Information gathering using windows command line utility
 
Commands
CommandsCommands
Commands
 
Commands used in Assessing Network layout & Security
Commands used in Assessing Network layout & SecurityCommands used in Assessing Network layout & Security
Commands used in Assessing Network layout & Security
 
Traceroute- A Networking Tool
Traceroute- A Networking ToolTraceroute- A Networking Tool
Traceroute- A Networking Tool
 
CCNA Interview.pdf
CCNA Interview.pdfCCNA Interview.pdf
CCNA Interview.pdf
 
Network commands
Network commandsNetwork commands
Network commands
 
Hacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria GrunickHacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria Grunick
 
01204427-scanner.ppt
01204427-scanner.ppt01204427-scanner.ppt
01204427-scanner.ppt
 
Node finder presentation
Node finder presentationNode finder presentation
Node finder presentation
 
Group Apres
Group ApresGroup Apres
Group Apres
 
C Cpres
C CpresC Cpres
C Cpres
 
C Cpres
C CpresC Cpres
C Cpres
 
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdf
 
PACKET Sniffer IMPLEMENTATION
PACKET Sniffer IMPLEMENTATIONPACKET Sniffer IMPLEMENTATION
PACKET Sniffer IMPLEMENTATION
 
Transport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP PortTransport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP Port
 

Mehr von Steve Bishop

Cognitive load theory
Cognitive load theoryCognitive load theory
Cognitive load theorySteve Bishop
 
Blockbusters #soccd
Blockbusters #soccdBlockbusters #soccd
Blockbusters #soccdSteve Bishop
 
Blockbusters template
Blockbusters templateBlockbusters template
Blockbusters templateSteve Bishop
 
Blockbusters #socfam
Blockbusters #socfamBlockbusters #socfam
Blockbusters #socfamSteve Bishop
 
2.6 acids bases and salts
2.6 acids bases and salts2.6 acids bases and salts
2.6 acids bases and saltsSteve Bishop
 
C2.5 exothermic and endothermic reactions
C2.5 exothermic and endothermic reactionsC2.5 exothermic and endothermic reactions
C2.5 exothermic and endothermic reactionsSteve Bishop
 
C2.3.3 quantitative chemistry
C2.3.3 quantitative chemistryC2.3.3 quantitative chemistry
C2.3.3 quantitative chemistrySteve Bishop
 
C2.2 how structure influences
C2.2 how structure influencesC2.2 how structure influences
C2.2 how structure influencesSteve Bishop
 
C2.1 structure and bonding
C2.1 structure and bondingC2.1 structure and bonding
C2.1 structure and bondingSteve Bishop
 
C2.1 structure and bonding
C2.1 structure and bondingC2.1 structure and bonding
C2.1 structure and bondingSteve Bishop
 
B2.7 meiosis and mitosis
B2.7 meiosis and mitosisB2.7 meiosis and mitosis
B2.7 meiosis and mitosisSteve Bishop
 
B2.7 genetic disorders
B2.7 genetic disordersB2.7 genetic disorders
B2.7 genetic disordersSteve Bishop
 
B2.7 cell division and inheritance
B2.7 cell division and inheritanceB2.7 cell division and inheritance
B2.7 cell division and inheritanceSteve Bishop
 
B2.5 proteins enzymes
B2.5 proteins enzymesB2.5 proteins enzymes
B2.5 proteins enzymesSteve Bishop
 
Aerobic & anaerobic respiration
Aerobic & anaerobic respirationAerobic & anaerobic respiration
Aerobic & anaerobic respirationSteve Bishop
 
B1.4 pollution detectors
B1.4 pollution detectorsB1.4 pollution detectors
B1.4 pollution detectorsSteve Bishop
 
B1.4 plants adaptation
B1.4 plants adaptationB1.4 plants adaptation
B1.4 plants adaptationSteve Bishop
 
B1.4 animals adaptations
B1.4 animals adaptationsB1.4 animals adaptations
B1.4 animals adaptationsSteve Bishop
 

Mehr von Steve Bishop (20)

Cognitive load theory
Cognitive load theoryCognitive load theory
Cognitive load theory
 
Blockbusters #soccd
Blockbusters #soccdBlockbusters #soccd
Blockbusters #soccd
 
Blockbusters template
Blockbusters templateBlockbusters template
Blockbusters template
 
Blockbusters #socfam
Blockbusters #socfamBlockbusters #socfam
Blockbusters #socfam
 
2.6 acids bases and salts
2.6 acids bases and salts2.6 acids bases and salts
2.6 acids bases and salts
 
C2.5 exothermic and endothermic reactions
C2.5 exothermic and endothermic reactionsC2.5 exothermic and endothermic reactions
C2.5 exothermic and endothermic reactions
 
C2.3.3 quantitative chemistry
C2.3.3 quantitative chemistryC2.3.3 quantitative chemistry
C2.3.3 quantitative chemistry
 
C2.2 how structure influences
C2.2 how structure influencesC2.2 how structure influences
C2.2 how structure influences
 
C2.1 structure and bonding
C2.1 structure and bondingC2.1 structure and bonding
C2.1 structure and bonding
 
C2.1 structure and bonding
C2.1 structure and bondingC2.1 structure and bonding
C2.1 structure and bonding
 
B2.8 speciation
B2.8 speciationB2.8 speciation
B2.8 speciation
 
B2.7 meiosis and mitosis
B2.7 meiosis and mitosisB2.7 meiosis and mitosis
B2.7 meiosis and mitosis
 
B2.7 genetic disorders
B2.7 genetic disordersB2.7 genetic disorders
B2.7 genetic disorders
 
B2.7 cell division and inheritance
B2.7 cell division and inheritanceB2.7 cell division and inheritance
B2.7 cell division and inheritance
 
B2.5 proteins enzymes
B2.5 proteins enzymesB2.5 proteins enzymes
B2.5 proteins enzymes
 
Aerobic & anaerobic respiration
Aerobic & anaerobic respirationAerobic & anaerobic respiration
Aerobic & anaerobic respiration
 
B1.4 red v grey
B1.4 red v greyB1.4 red v grey
B1.4 red v grey
 
B1.4 pollution detectors
B1.4 pollution detectorsB1.4 pollution detectors
B1.4 pollution detectors
 
B1.4 plants adaptation
B1.4 plants adaptationB1.4 plants adaptation
B1.4 plants adaptation
 
B1.4 animals adaptations
B1.4 animals adaptationsB1.4 animals adaptations
B1.4 animals adaptations
 

Kürzlich hochgeladen

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Ping Tracert

  • 2. Ping and tracert BTEOTSSBAT use the ping and tracert command
  • 3. M4 calculate and record the time for a packet of data to reach five different IP addresses using the ping command. D4 determine and record the route of a packet to reach five different IP addresses using the tracert command.
  • 4. A ping is the name of the process that tests whether a particular host (typically at an IP address) is accessible. It tests the network. It measures the time taken to reach the host and back again. A tracert is the name of the process that tests the network infrastructure. It traces the route and time a packet of information takes to reach its destination Both use the command prompt
  • 5. To run the ping and tracert command Click on start and then R un..
  • 6. This box will pop up. Type cmd and then enter
  • 7. A DOS box will appear
  • 8. To do a ping Type at C:gt; ping 10.1.1.6 Where 10.1.1.6 is the IP address
  • 9. To do a tracert Type at C:gt; t r acert 10.1.1.6 Where 10.1.1.6 is the IP address