
151
Diagnostic tools
Overview
Ping
You can use the ping function to check whether a device with a specified address is reachable, and to
examine network connectivity.
A successful execution of the
ping
command involves the following steps:
1.
The source device sends an ICMP echo request (ECHO-REQUEST) to the destination device.
2.
The destination device responds by sending an ICMP echo reply (ECHO-REPLY) to the source
device after receiving the ICMP echo request.
3.
The source device displays related statistics after receiving the reply.
Output of the
ping
command falls into the following:
•
The
ping
command can be applied to the destination's host name or IP address. If the destination's
host name is unknown, the prompt information is displayed.
•
If the source device does not receive an ICMP echo reply within the timeout time, it displays the
prompt information and the statistics during the ping operation. If the source device receives an
ICMP echo reply within the timeout time, it displays the number of bytes of the echo reply, the
message sequence number, Time to Live (TTL), the response time, and the statistics during the ping
operation. Statistics during the ping operation include number of packets sent, number of echo
reply messages received, percentage of messages not received, and the minimum, average, and
maximum response time.
Trace route
By using the
trace route
command, you can display the Layer 3 devices involved in delivering a packet
from source to destination. This function is useful for identification of failed node(s) in the event of network
failure.
Executing the
trace route
command involves the following steps in its execution:
1.
The source device sends a packet with a TTL value of 1 to the destination device.
2.
The first hop (the Layer 3 device that first receives the packet) responds by sending a TTL-expired
ICMP message to the source, with its IP address encapsulated. In this way, the source device can
get the address of the first Layer 3 device.
3.
The source device sends a packet with a TTL value of 2 to the destination device.
4.
The second hop responds with a TTL-expired ICMP message, which gives the source device the
address of the second Layer 3 device.
5.
This process continues until the ultimate destination device is reached. In this way, the source
device can trace the addresses of all the Layer 3 devices involved to get to the destination device.
The
traceroute
command can be applied to the destination's host name or IP address. If the destination's
host name is unknown, the prompt information is displayed.
Содержание WA2612-AGN
Страница 106: ...93 Figure 90 Create a static MAC address entry ...
Страница 126: ...113 Figure 116 Information about an IGMP snooping multicast entry ...
Страница 145: ...132 Enter 10 1 1 2 for Gateway Address c Click Apply Figure 133 Configure a dynamic address pool for the DHCP server ...
Страница 187: ...174 Figure 174 Firefox web browser setting ...
Страница 219: ...206 Figure 202 Common configuration area 6 Configure the advanced parameters ...
Страница 243: ...230 Number of users Real time accounting interval in minutes 500 to 999 12 1000 15 ...
Страница 278: ...265 Figure 266 Network diagram LAN Segment ...
Страница 339: ...326 Figure 348 Configure the wireless card I ...
Страница 340: ...327 Figure 349 Configure the wireless card II ...
Страница 346: ...333 Figure 357 Configure the wireless card II ...