SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
NETWORKING TOOL
TRACERT/TRACEROUTE
Introduction
Traceroute is a utility that send an ICMP packets from our computer to user input
destination and displays information about what is happening to the packet on each
point along the path. The path displayed is the list of near-side interface of the
routers between a source host and a destination. It also calculates and displays the
amount of time each hop took.
Hops are nothing but the computers, routers, or any devices that comes in between the source
and the destination.
Purpose of Traceroute
The purpose of traceroute is to identify the problematic server that is causing the
error, and that is why we send traceroute info only if there is an error before reaching
our servers. Traceroute is a very resource consuming operation and it will slow down
our servers a lot if we do it all the time. Network administrators and system
administrators use this tool most commonly in their day to day activities.
Types of Traceroute Program
There are different types of traceroute programs. Each of them works slightly
differently. But the overall concept behind each of them is the same. All of them use
the TTL value. The different types are mentioned below.
1) UDP Traceroute- It’s the default protocol used by Linux traceroute program.
However we can also use ICMP instead of UDP by giving the below
command in Linux.
root@workstation:~# traceroute -I -n 8.8.8.8
2) ICMP Traceroute- ICMP for traceroute works the same way as UDP
traceroute. Traceroute program will send ICMP Echo Request messages and
the hops in between will reply with a ICMP Time exceeded messages. But the
final destination will reply with ICMP Echo reply. Tracert command available in
windows operating system by default uses ICMP traceroute method.
3) TCP Traceroute- Its used because almost all firewall and routers in between
allows you to send TCP traffic. And if the packet is toward port 80, which is
the web traffic then most of the routers allow that packet. TCPTRACEROUTE
by default sends TCP SYN requests to port 80.
Objectives of Traceroute
● Traceroute determines how packets are being routed to a particular host.
● It also helps in determining the entire path that a packet travels through
● Determines names and identity of routers and devices in your path
● Helps in determining the Network Latency or more specifically the time taken to
send and receive data to each devices on the path
● It is useful in determining where a network outage is occurring, test connectivity
and determining congestion in traffic.
● Traceroute is a handy tool both for understanding where problems are in the
Internet network and for getting a detailed sense of the Internet itself.
● TRACERT is useful for troubleshooting large networks where several paths can
lead to the same point or where many intermediate components (routers or bridges)
are involved.
How Traceroute Works
When we connect to a website – say, google.com – the traffic has to go through
several intermediaries before reaching the website. The traffic goes through our local
router, our Internet service provider’s routers, onto larger networks, and so on.
Traceroute shows us the path traffic takes to reach the website. It also displays the
delays that occur at each stop. If we’re having issues reaching a website and that
website is working properly, it’s possible there’s a problem somewhere on the path
between our computer and the website’s servers. Traceroute would show us where
that problem is.
In more technical terms, Traceroute sends a sequence of packets using the ICMP
protocol. The first packet has a time-to-live (also known as TTL, or hop limit) of 1, the
second packet has a TTL of 2, and so on. Each time a packet is passed to a new
router, the TTL is decreased by 1. When it reaches 0, the packet is discarded and
the router returns an error message. By sending packets in this manner, traceroute
ensures that each router in the path will discard a packet and send a response.
Traceroute Command
The tracert command is CMD command that's used to show several details about
the path that a packet takes from the computer or device you're on to whatever
destination you specify.
It also sometimes referred as the traceroute command.
Tracert Command Syntax
The command for Unix systems is traceroute, whereas on Linux systems the
command is tracepath and current windows base systems used the command
tracert.
Syntax
tracert [-d] [-h MaxHops] [-w TimeOut] [-4] [-6] target [/?]
● -d = This option prevents tracert from resolving IP addresses to hostnames, often
resulting in much faster results.
● -h MaxHops = This tracert option specifies the maximum number of hops in the
search for the target.
● -w TimeOut = You can specify the time, in milliseconds, to allow each reply before
timeout using this tracert option.
● -4 = This option forces tracert to use IPv4 only.
● -6 = This option forces tracert to use IPv6 only.
● target = This is the destination, either an IP address or hostname.
● /? = Use the help switch with the tracert command to show detailed help about the
command's several options.
How to Use Traceroute
Suppose we want to do a traceroute to Google’s publicly available DNS server
(8.8.8.8). My traceroute command and its result will look something like the below.
tracert 8.8.8.8
When we fire that command of tracert 8.8.8.8, my computer makes a UDP packet.
This UDP packet will contain the following things.
1) My Source Address (Which is my IP address)
2) Destination address (Which is 8.8.8.8)
3) And a destination UDP port number which is invalid. Means the traceroute
utility will send packet to a UDP port in the range of 33434 to 33534, which is
normally unused.
Save the tracert output in a text file as follows:
1) Right-click the title bar of the Command Prompt window and choose Edit >
Select All.
2) Right-click the title bar of the Command Prompt window again and choose
Edit > Copy.
3) Open the Windows Notepad program: Windows Start icon > All Programs >
Accessories > Notepad.
4) To paste the output into Notepad, choose Edit > Paste.
5) Choose File > Save As and save the Notepad file to your desktop as
tracert1.txt.
Traceroute session may be stopped by pressing [Ctrl]+[C].
Note: - The tracert command is often used with other networking related Command
Prompt commands like ping, ipconfig, netstat, nslookup, and others.
Thank You
Traceroute- A Networking Tool

Contenu connexe

Tendances

Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
Phan Vuong
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
Mannu Khani
 
remote procedure calls
  remote procedure calls  remote procedure calls
remote procedure calls
Ashish Kumar
 

Tendances (20)

Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Icmp
IcmpIcmp
Icmp
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure call
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Introduction to Application layer
Introduction to Application layerIntroduction to Application layer
Introduction to Application layer
 
IPV4 Frame Format
IPV4 Frame FormatIPV4 Frame Format
IPV4 Frame Format
 
Transport layer
Transport layer Transport layer
Transport layer
 
Dns
DnsDns
Dns
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 
TCP - Transmission Control Protocol
TCP - Transmission Control ProtocolTCP - Transmission Control Protocol
TCP - Transmission Control Protocol
 
Naming in Distributed System
Naming in Distributed SystemNaming in Distributed System
Naming in Distributed System
 
Distance Vector Routing
Distance Vector RoutingDistance Vector Routing
Distance Vector Routing
 
SMTP Simple Mail Transfer Protocol
SMTP Simple Mail Transfer ProtocolSMTP Simple Mail Transfer Protocol
SMTP Simple Mail Transfer Protocol
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
remote procedure calls
  remote procedure calls  remote procedure calls
remote procedure calls
 

En vedette

Windows command prompt a to z
Windows command prompt a to zWindows command prompt a to z
Windows command prompt a to z
Subuh Kurniawan
 
Ericsson BTS commisioning
Ericsson BTS commisioningEricsson BTS commisioning
Ericsson BTS commisioning
Shahid Rasool
 

En vedette (9)

Putty
PuttyPutty
Putty
 
Ip Networking Over Satelite Course Sampler
Ip Networking Over Satelite Course SamplerIp Networking Over Satelite Course Sampler
Ip Networking Over Satelite Course Sampler
 
Windows command prompt a to z
Windows command prompt a to zWindows command prompt a to z
Windows command prompt a to z
 
Secure SHell
Secure SHellSecure SHell
Secure SHell
 
Secure Shell(ssh)
Secure Shell(ssh)Secure Shell(ssh)
Secure Shell(ssh)
 
3 g basics
3 g basics3 g basics
3 g basics
 
SSH - Secure Shell
SSH - Secure ShellSSH - Secure Shell
SSH - Secure Shell
 
Ericsson commond list, BSS+NSS=OSS
Ericsson commond list, BSS+NSS=OSSEricsson commond list, BSS+NSS=OSS
Ericsson commond list, BSS+NSS=OSS
 
Ericsson BTS commisioning
Ericsson BTS commisioningEricsson BTS commisioning
Ericsson BTS commisioning
 

Similaire à Traceroute- A Networking Tool

Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
masoodnt10
 
Aceleracion TCP Mikrotik.pdf
Aceleracion TCP Mikrotik.pdfAceleracion TCP Mikrotik.pdf
Aceleracion TCP Mikrotik.pdf
WifiCren
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
ssuserf7cd2b
 
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxWireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
alanfhall8953
 
Pears
PearsPears
Pears
thips
 

Similaire à Traceroute- A Networking Tool (20)

Troubleshooting basic networks
Troubleshooting basic networksTroubleshooting basic networks
Troubleshooting basic networks
 
ICMPV4
ICMPV4ICMPV4
ICMPV4
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
 
Commands used in Assessing Network layout & Security
Commands used in Assessing Network layout & SecurityCommands used in Assessing Network layout & Security
Commands used in Assessing Network layout & Security
 
Command.pptx presentation
Command.pptx presentationCommand.pptx presentation
Command.pptx presentation
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
 
Aceleracion TCP Mikrotik.pdf
Aceleracion TCP Mikrotik.pdfAceleracion TCP Mikrotik.pdf
Aceleracion TCP Mikrotik.pdf
 
How Does The Internet Work? : Notes
How Does The Internet Work? : NotesHow Does The Internet Work? : Notes
How Does The Internet Work? : Notes
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...
 
Ch 19 Network-layer protocols - section 2
Ch 19   Network-layer protocols - section 2Ch 19   Network-layer protocols - section 2
Ch 19 Network-layer protocols - section 2
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
CCNA Interview.pdf
CCNA Interview.pdfCCNA Interview.pdf
CCNA Interview.pdf
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
SOFTWARE TOOLS(Bhavik).pptx
SOFTWARE TOOLS(Bhavik).pptxSOFTWARE TOOLS(Bhavik).pptx
SOFTWARE TOOLS(Bhavik).pptx
 
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxWireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
 
CREST CCT Exam Prep Notes
CREST CCT Exam Prep NotesCREST CCT Exam Prep Notes
CREST CCT Exam Prep Notes
 
Pears
PearsPears
Pears
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Tcp presentation
Tcp presentationTcp presentation
Tcp presentation
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
 

Dernier

DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
Health
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 

Dernier (20)

Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 

Traceroute- A Networking Tool

  • 1. NETWORKING TOOL TRACERT/TRACEROUTE Introduction Traceroute is a utility that send an ICMP packets from our computer to user input destination and displays information about what is happening to the packet on each point along the path. The path displayed is the list of near-side interface of the routers between a source host and a destination. It also calculates and displays the amount of time each hop took. Hops are nothing but the computers, routers, or any devices that comes in between the source and the destination.
  • 2. Purpose of Traceroute The purpose of traceroute is to identify the problematic server that is causing the error, and that is why we send traceroute info only if there is an error before reaching our servers. Traceroute is a very resource consuming operation and it will slow down our servers a lot if we do it all the time. Network administrators and system administrators use this tool most commonly in their day to day activities. Types of Traceroute Program There are different types of traceroute programs. Each of them works slightly differently. But the overall concept behind each of them is the same. All of them use the TTL value. The different types are mentioned below. 1) UDP Traceroute- It’s the default protocol used by Linux traceroute program. However we can also use ICMP instead of UDP by giving the below command in Linux. root@workstation:~# traceroute -I -n 8.8.8.8 2) ICMP Traceroute- ICMP for traceroute works the same way as UDP traceroute. Traceroute program will send ICMP Echo Request messages and the hops in between will reply with a ICMP Time exceeded messages. But the final destination will reply with ICMP Echo reply. Tracert command available in windows operating system by default uses ICMP traceroute method. 3) TCP Traceroute- Its used because almost all firewall and routers in between allows you to send TCP traffic. And if the packet is toward port 80, which is the web traffic then most of the routers allow that packet. TCPTRACEROUTE by default sends TCP SYN requests to port 80. Objectives of Traceroute ● Traceroute determines how packets are being routed to a particular host. ● It also helps in determining the entire path that a packet travels through ● Determines names and identity of routers and devices in your path ● Helps in determining the Network Latency or more specifically the time taken to send and receive data to each devices on the path ● It is useful in determining where a network outage is occurring, test connectivity and determining congestion in traffic.
  • 3. ● Traceroute is a handy tool both for understanding where problems are in the Internet network and for getting a detailed sense of the Internet itself. ● TRACERT is useful for troubleshooting large networks where several paths can lead to the same point or where many intermediate components (routers or bridges) are involved. How Traceroute Works When we connect to a website – say, google.com – the traffic has to go through several intermediaries before reaching the website. The traffic goes through our local router, our Internet service provider’s routers, onto larger networks, and so on. Traceroute shows us the path traffic takes to reach the website. It also displays the delays that occur at each stop. If we’re having issues reaching a website and that website is working properly, it’s possible there’s a problem somewhere on the path between our computer and the website’s servers. Traceroute would show us where that problem is.
  • 4. In more technical terms, Traceroute sends a sequence of packets using the ICMP protocol. The first packet has a time-to-live (also known as TTL, or hop limit) of 1, the second packet has a TTL of 2, and so on. Each time a packet is passed to a new router, the TTL is decreased by 1. When it reaches 0, the packet is discarded and the router returns an error message. By sending packets in this manner, traceroute ensures that each router in the path will discard a packet and send a response. Traceroute Command The tracert command is CMD command that's used to show several details about the path that a packet takes from the computer or device you're on to whatever destination you specify. It also sometimes referred as the traceroute command. Tracert Command Syntax The command for Unix systems is traceroute, whereas on Linux systems the command is tracepath and current windows base systems used the command tracert. Syntax tracert [-d] [-h MaxHops] [-w TimeOut] [-4] [-6] target [/?] ● -d = This option prevents tracert from resolving IP addresses to hostnames, often resulting in much faster results. ● -h MaxHops = This tracert option specifies the maximum number of hops in the search for the target. ● -w TimeOut = You can specify the time, in milliseconds, to allow each reply before timeout using this tracert option. ● -4 = This option forces tracert to use IPv4 only.
  • 5. ● -6 = This option forces tracert to use IPv6 only. ● target = This is the destination, either an IP address or hostname. ● /? = Use the help switch with the tracert command to show detailed help about the command's several options. How to Use Traceroute Suppose we want to do a traceroute to Google’s publicly available DNS server (8.8.8.8). My traceroute command and its result will look something like the below. tracert 8.8.8.8 When we fire that command of tracert 8.8.8.8, my computer makes a UDP packet. This UDP packet will contain the following things. 1) My Source Address (Which is my IP address) 2) Destination address (Which is 8.8.8.8) 3) And a destination UDP port number which is invalid. Means the traceroute utility will send packet to a UDP port in the range of 33434 to 33534, which is normally unused.
  • 6. Save the tracert output in a text file as follows: 1) Right-click the title bar of the Command Prompt window and choose Edit > Select All. 2) Right-click the title bar of the Command Prompt window again and choose Edit > Copy. 3) Open the Windows Notepad program: Windows Start icon > All Programs > Accessories > Notepad. 4) To paste the output into Notepad, choose Edit > Paste. 5) Choose File > Save As and save the Notepad file to your desktop as tracert1.txt. Traceroute session may be stopped by pressing [Ctrl]+[C]. Note: - The tracert command is often used with other networking related Command Prompt commands like ping, ipconfig, netstat, nslookup, and others. Thank You