Ping Tracert

S
Steve BishopLecturer at Further education
Forensic Science Informatics Unit 37 M4, D4
Ping  and tracert BTEOTSSBAT use the ping and tracert command
M4  calculate and record the time for a packet of data to reach five different IP addresses using the ping command. D4  determine and record the route of a packet to reach five different IP addresses using the tracert command.
A  ping  is the name of the process that tests whether a particular host (typically at an IP address) is accessible. It tests the network. It measures the time taken to reach the host and back again.  A  tracert  is the name of the process that tests the network infrastructure. It traces the route and time a packet of information takes to reach its destination Both use the  command prompt
To run the  ping  and  tracert  command Click on  start  and then  R un..
This box will pop up. Type cmd and then enter
A DOS box will appear
To do a  ping  Type at C:gt; ping 10.1.1.6 Where  10.1.1.6  is the IP address
To do a  tracert Type at C:gt; t r acert  10.1.1.6 Where  10.1.1.6  is the IP address
1 of 9

Recommended

introducing PING comand by
introducing PING comandintroducing PING comand
introducing PING comandali torabi
308 views24 slides
Detecting Reconnaissance Through Packet Forensics by Shashank Nigam by
Detecting Reconnaissance Through Packet Forensics by Shashank NigamDetecting Reconnaissance Through Packet Forensics by Shashank Nigam
Detecting Reconnaissance Through Packet Forensics by Shashank NigamOWASP Delhi
1.2K views30 slides
Gratuitous Address Resolution Protocol(G-ARP) by
Gratuitous Address Resolution Protocol(G-ARP) Gratuitous Address Resolution Protocol(G-ARP)
Gratuitous Address Resolution Protocol(G-ARP) Sachin Khanna
208 views12 slides
IETF 80: Security Extensions for OSPF by
IETF 80: Security Extensions for OSPFIETF 80: Security Extensions for OSPF
IETF 80: Security Extensions for OSPFmanav416
318 views14 slides
At640 datasheet-d20110704 en by
At640 datasheet-d20110704 enAt640 datasheet-d20110704 en
At640 datasheet-d20110704 enTran Thanh
189 views1 slide
Pcap Headers Description by
Pcap Headers DescriptionPcap Headers Description
Pcap Headers DescriptionShravan Kumar
5.6K views40 slides

More Related Content

What's hot

ip_spoofing.pdf by
ip_spoofing.pdfip_spoofing.pdf
ip_spoofing.pdfLukePham1
65 views4 slides
Itep by
ItepItep
ItepSofia Palawan
471 views11 slides
Module 3 Scanning by
Module 3   ScanningModule 3   Scanning
Module 3 Scanningleminhvuong
3.1K views55 slides
IPsec Basics: AH and ESP Explained by
IPsec Basics: AH and ESP ExplainedIPsec Basics: AH and ESP Explained
IPsec Basics: AH and ESP ExplainedAndriy Berestovskyy
1.8K views25 slides
Port Scanning by
Port ScanningPort Scanning
Port Scanningamiable_indian
4.1K views26 slides
At610 shared by voip.com.vn by
At610 shared by voip.com.vnAt610 shared by voip.com.vn
At610 shared by voip.com.vnTran Thanh
314 views1 slide

Similar to Ping Tracert

CSS L17 - DOS COMMANDS IN COMPUTER NETWORKING by
CSS L17 - DOS COMMANDS IN COMPUTER NETWORKINGCSS L17 - DOS COMMANDS IN COMPUTER NETWORKING
CSS L17 - DOS COMMANDS IN COMPUTER NETWORKINGMarvin Bronoso
2.7K views17 slides
Commands.pptx by
Commands.pptxCommands.pptx
Commands.pptxssuser39789f
15 views10 slides
Networking session-4-final by aravind.R by
Networking session-4-final by aravind.RNetworking session-4-final by aravind.R
Networking session-4-final by aravind.RNavaneethan Naveen
695 views15 slides
Command.pptx presentation by
Command.pptx presentationCommand.pptx presentation
Command.pptx presentationAkshay193557
10 views19 slides
Information gathering using windows command line utility by
Information gathering using windows command line utilityInformation gathering using windows command line utility
Information gathering using windows command line utilityVishal Kumar
1.9K views22 slides

Similar to Ping Tracert(20)

CSS L17 - DOS COMMANDS IN COMPUTER NETWORKING by Marvin Bronoso
CSS L17 - DOS COMMANDS IN COMPUTER NETWORKINGCSS L17 - DOS COMMANDS IN COMPUTER NETWORKING
CSS L17 - DOS COMMANDS IN COMPUTER NETWORKING
Marvin Bronoso2.7K views
Command.pptx presentation by Akshay193557
Command.pptx presentationCommand.pptx presentation
Command.pptx presentation
Akshay19355710 views
Information gathering using windows command line utility by Vishal Kumar
Information gathering using windows command line utilityInformation gathering using windows command line utility
Information gathering using windows command line utility
Vishal Kumar1.9K views
Commands used in Assessing Network layout & Security by LearningwithRayYT
Commands used in Assessing Network layout & SecurityCommands used in Assessing Network layout & Security
Commands used in Assessing Network layout & Security
Traceroute- A Networking Tool by Amit Kumar
Traceroute- A Networking ToolTraceroute- A Networking Tool
Traceroute- A Networking Tool
Amit Kumar1.7K views
CCNA Interview.pdf by hoang971
CCNA Interview.pdfCCNA Interview.pdf
CCNA Interview.pdf
hoang9715 views
Hacking Fundamentals - Jen Johnson , Miria Grunick by amiable_indian
Hacking Fundamentals - Jen Johnson , Miria GrunickHacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria Grunick
amiable_indian30.8K views
Group Apres by ramya5a
Group ApresGroup Apres
Group Apres
ramya5a230 views
C Cpres by ramya5a
C CpresC Cpres
C Cpres
ramya5a119 views
C Cpres by ramya5a
C CpresC Cpres
C Cpres
ramya5a145 views
Internet Protocol.pdf by BIT DURG
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdf
BIT DURG9 views
PACKET Sniffer IMPLEMENTATION by Goutham Royal
PACKET Sniffer IMPLEMENTATIONPACKET Sniffer IMPLEMENTATION
PACKET Sniffer IMPLEMENTATION
Goutham Royal1.4K views
Transport Layer Port or TCP/IP & UDP Port by Netwax Lab
Transport Layer Port or TCP/IP & UDP PortTransport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP Port
Netwax Lab1.3K views

More from Steve Bishop

Cognitive load theory by
Cognitive load theoryCognitive load theory
Cognitive load theorySteve Bishop
2.8K views38 slides
Blockbusters #soccd by
Blockbusters #soccdBlockbusters #soccd
Blockbusters #soccdSteve Bishop
1.6K views1 slide
Blockbusters template by
Blockbusters templateBlockbusters template
Blockbusters templateSteve Bishop
487 views1 slide
Blockbusters #socfam by
Blockbusters #socfamBlockbusters #socfam
Blockbusters #socfamSteve Bishop
252 views1 slide
2.6 acids bases and salts by
2.6 acids bases and salts2.6 acids bases and salts
2.6 acids bases and saltsSteve Bishop
3.3K views45 slides
C2.5 exothermic and endothermic reactions by
C2.5 exothermic and endothermic reactionsC2.5 exothermic and endothermic reactions
C2.5 exothermic and endothermic reactionsSteve Bishop
9K views21 slides

More from Steve Bishop(20)

Cognitive load theory by Steve Bishop
Cognitive load theoryCognitive load theory
Cognitive load theory
Steve Bishop2.8K views
Blockbusters #soccd by Steve Bishop
Blockbusters #soccdBlockbusters #soccd
Blockbusters #soccd
Steve Bishop1.6K views
Blockbusters template by Steve Bishop
Blockbusters templateBlockbusters template
Blockbusters template
Steve Bishop487 views
Blockbusters #socfam by Steve Bishop
Blockbusters #socfamBlockbusters #socfam
Blockbusters #socfam
Steve Bishop252 views
2.6 acids bases and salts by Steve Bishop
2.6 acids bases and salts2.6 acids bases and salts
2.6 acids bases and salts
Steve Bishop3.3K views
C2.5 exothermic and endothermic reactions by Steve Bishop
C2.5 exothermic and endothermic reactionsC2.5 exothermic and endothermic reactions
C2.5 exothermic and endothermic reactions
Steve Bishop9K views
C2.3.3 quantitative chemistry by Steve Bishop
C2.3.3 quantitative chemistryC2.3.3 quantitative chemistry
C2.3.3 quantitative chemistry
Steve Bishop5K views
C2.2 how structure influences by Steve Bishop
C2.2 how structure influencesC2.2 how structure influences
C2.2 how structure influences
Steve Bishop2.6K views
C2.1 structure and bonding by Steve Bishop
C2.1 structure and bondingC2.1 structure and bonding
C2.1 structure and bonding
Steve Bishop3.4K views
C2.1 structure and bonding by Steve Bishop
C2.1 structure and bondingC2.1 structure and bonding
C2.1 structure and bonding
Steve Bishop5.2K views
B2.7 meiosis and mitosis by Steve Bishop
B2.7 meiosis and mitosisB2.7 meiosis and mitosis
B2.7 meiosis and mitosis
Steve Bishop4.4K views
B2.7 genetic disorders by Steve Bishop
B2.7 genetic disordersB2.7 genetic disorders
B2.7 genetic disorders
Steve Bishop2.4K views
B2.7 cell division and inheritance by Steve Bishop
B2.7 cell division and inheritanceB2.7 cell division and inheritance
B2.7 cell division and inheritance
Steve Bishop2.2K views
B2.5 proteins enzymes by Steve Bishop
B2.5 proteins enzymesB2.5 proteins enzymes
B2.5 proteins enzymes
Steve Bishop5.9K views
Aerobic & anaerobic respiration by Steve Bishop
Aerobic & anaerobic respirationAerobic & anaerobic respiration
Aerobic & anaerobic respiration
Steve Bishop46.6K views
B1.4 pollution detectors by Steve Bishop
B1.4 pollution detectorsB1.4 pollution detectors
B1.4 pollution detectors
Steve Bishop1.8K views
B1.4 plants adaptation by Steve Bishop
B1.4 plants adaptationB1.4 plants adaptation
B1.4 plants adaptation
Steve Bishop4.5K views
B1.4 animals adaptations by Steve Bishop
B1.4 animals adaptationsB1.4 animals adaptations
B1.4 animals adaptations
Steve Bishop3.9K views

Recently uploaded

20231123_Camunda Meetup Vienna.pdf by
20231123_Camunda Meetup Vienna.pdf20231123_Camunda Meetup Vienna.pdf
20231123_Camunda Meetup Vienna.pdfPhactum Softwareentwicklung GmbH
28 views73 slides
Top 10 Strategic Technologies in 2024: AI and Automation by
Top 10 Strategic Technologies in 2024: AI and AutomationTop 10 Strategic Technologies in 2024: AI and Automation
Top 10 Strategic Technologies in 2024: AI and AutomationAutomationEdge Technologies
14 views14 slides
DALI Basics Course 2023 by
DALI Basics Course  2023DALI Basics Course  2023
DALI Basics Course 2023Ivory Egg
14 views12 slides
virtual reality.pptx by
virtual reality.pptxvirtual reality.pptx
virtual reality.pptxG036GaikwadSnehal
11 views15 slides
Report 2030 Digital Decade by
Report 2030 Digital DecadeReport 2030 Digital Decade
Report 2030 Digital DecadeMassimo Talia
14 views41 slides
Scaling Knowledge Graph Architectures with AI by
Scaling Knowledge Graph Architectures with AIScaling Knowledge Graph Architectures with AI
Scaling Knowledge Graph Architectures with AIEnterprise Knowledge
24 views15 slides

Recently uploaded(20)

DALI Basics Course 2023 by Ivory Egg
DALI Basics Course  2023DALI Basics Course  2023
DALI Basics Course 2023
Ivory Egg14 views
HTTP headers that make your website go faster - devs.gent November 2023 by Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn19 views
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software225 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson33 views
Empathic Computing: Delivering the Potential of the Metaverse by Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst470 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker26 views
From chaos to control: Managing migrations and Microsoft 365 with ShareGate! by sammart93
From chaos to control: Managing migrations and Microsoft 365 with ShareGate!From chaos to control: Managing migrations and Microsoft 365 with ShareGate!
From chaos to control: Managing migrations and Microsoft 365 with ShareGate!
sammart939 views
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab15 views
Business Analyst Series 2023 - Week 3 Session 5 by DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10209 views
Data-centric AI and the convergence of data and model engineering: opportunit... by Paolo Missier
Data-centric AI and the convergence of data and model engineering:opportunit...Data-centric AI and the convergence of data and model engineering:opportunit...
Data-centric AI and the convergence of data and model engineering: opportunit...
Paolo Missier34 views

Ping Tracert

  • 2. Ping and tracert BTEOTSSBAT use the ping and tracert command
  • 3. M4 calculate and record the time for a packet of data to reach five different IP addresses using the ping command. D4 determine and record the route of a packet to reach five different IP addresses using the tracert command.
  • 4. A ping is the name of the process that tests whether a particular host (typically at an IP address) is accessible. It tests the network. It measures the time taken to reach the host and back again. A tracert is the name of the process that tests the network infrastructure. It traces the route and time a packet of information takes to reach its destination Both use the command prompt
  • 5. To run the ping and tracert command Click on start and then R un..
  • 6. This box will pop up. Type cmd and then enter
  • 7. A DOS box will appear
  • 8. To do a ping Type at C:gt; ping 10.1.1.6 Where 10.1.1.6 is the IP address
  • 9. To do a tracert Type at C:gt; t r acert 10.1.1.6 Where 10.1.1.6 is the IP address