Open
Close

Ping trace. Route tracing: why is it needed? Ping intermediate nodes

When we access an Internet portal, the computer sends a request to the server. Along the way it passes through routers. If everything is in order, the resource is displayed in our browser.

If the site is not working, the computer’s request did not reach the server - it was lost at one of the intermediate communication nodes or the reason is something else (the site itself does not work). To figure out exactly where the problem is, let's trace the route.

When contacting a resource's technical support service, this is usually the first thing you are asked to do if the site is not working. This is due to the fact that the site may not work due to communication outages on a particular node, but overall the site is working and everything is fine with it.

How to trace a route to a server or website in OS Windows.

We launch the command line through the menu “Start - All Programs - Accessories”. Or press the key combination “Win ​​+ R”, the “Run a Program” system utility window appears, enter: “cmd” and click “ok”.

On the command line, enter: “tracert” and the address of the resource that needs to be checked. Press “enter”. As a result of the tracing, we will find out which intermediate nodes the packet passes through and the response time. Based on this information, you can understand where the problem is: with you, with your Internet provider, on one of the intermediate nodes, or on the site server. Asterisks mean that one of the routers does not want to respond.

Asterisks do not always mean a problem - there may be a firewall on the server that blocks “extra” packets, but allows “real” ones through and the page opens correctly in the browser.

Virtual website hosting for popular CMS:

In the command line we find out the IP address for tracing

If tracing does not work by domain name, we will do it by IP address. We recognize it through the “ping” command. This query shows the time it takes for a packet to reach the server and return back. The numbers in square brackets that come after the domain in the line “Exchange packets with...” are the required IP. In the screenshot: 88.214.230.21.

How to copy ping and trace results from the command line?

Even if domain tracing is successful, it is worth pinging the server to see if packets are being lost. Yes, and technical support may ask for data exchange statistics along with a tracing report.

Enter: tracert and IP address, press “enter” and get a report. If the data is needed not for you personally, but for those. support, select the required lines with the mouse and press “enter”. The information goes to the clipboard. Create a text file and paste it using the Ctrl + V key combination. Save it and send it to technical support.

On the Internet, in particular on forums, if there is a problem connecting to any node (), it is recommended to check the ping or perform a route trace and thus check the availability of the server.

But what is ping and what is trace? Ping is a tool (utility) for checking the integrity of connections in TCP/IP-based networks. Tracing (traceroute or tracert command) is a program for determining data routes on TCP/IP networks.

However, it is not always possible to find information about exactly how this check is performed: how to ping or how to make a route.

Ping check

To check ping, use the same command ping, which must be entered on the command line. You can launch the command line in the following ways:

Windows:

1) Start -> All programs -> Standard -> Command line

2) Start -> Execute -> cmd

There are many terminals in this OS, so you can use any of those installed on your PC for these purposes. Usually, a standard terminal can be launched with a keyboard shortcut CTRL+ALT+T.

So, to ping a specific server, you need to run the command:

Ping

For example, to ping an address 11.222.33.44 you need to run the command:

Ping 11.222.33.44

Below is an example of the results of ping one of the IP addresses.

As can be seen from the results, 4 packets of 32 bytes were sent and received. The exchange time for one packet was 47 milliseconds.

It's worth noting that Windows only sends 4 packets by default. In Linux, packet exchange continues until the user independently stops the process with a keyboard shortcut CTRL+C. To run ping in a similar way on Windows, you must use the parameter -t. For example:

Ping -t 11.222.33.44

Stopping packet exchange is performed using the same key combination - CTRL+C.

Setting the number of packets to be sent

To set the maximum number of packets to be sent, you must use the following command:

Windows:

Ping -n<число_пакетов> < IP или домен >

For example:

Ping -n 5 11.22.33.44

Ping -c<число_пакетов> < IP или домен >

For example:

Ping -c 5 11.22.33.44

Changing the size of sent packets

To ping using a specific packet size (in bytes), you need to use the following command:

Windows:

Ping -l<размер_пакетов> < IP или домен >

For example:

Ping -l 64 11.22.33.44

Ping -s< размер_пакетов> < IP или домен >

For example:

Ping -s 64 11.22.33.44

In this case, packets of 64 bytes in size were sent.

A route trace can show the speed of packets passing between routers that connect the PC from which the requests are coming and the destination server.

The following command is used to perform tracing:

Windows:

Tracert

For example:

Tracert wikipedia.org

Traceroute

For example:

Traceroute wikipedia.org

It is worth noting that by default, tracing also performs a DNS query to resolve the IP address to a domain name for each passing router. This option can be disabled, thereby reducing the time it takes to obtain trace results.

To activate this option you must use the following type of command:

Windows:

Tracert -d

Traceroute -n

To diagnose and find network problems, system administrators often use a handy tool called route tracing. It allows you to determine all the nodes (routers, servers, computers) through which traffic passes on the way to its destination. If the connection with any remote host breaks down or disappears altogether, then tracing the network route will allow you to quickly find the area where problems arose both in the local network and in the global Internet.
To perform this procedure, every modern operating system has a corresponding tool.

On Windows OS this is the tracert utility. In XP it was available by default, but in all subsequent versions up to Windows 10 it must be additionally enabled through “Programs and Features”.

In operating systems of the *NIX family - Linux, FreeBSD, Android - traceroute program
The meaning of the route tracing algorithm is that three special requests are sent to each network node through which traffic goes to the desired host, then for each of them on the screen, next to its address, the response time is displayed. Based on these results, you can easily track in which part of the network the response delays begin to appear or it disappears altogether.

Tracing in Windows 10

To conduct network tracing in Windows 10, you need to press the Win+R key combination and type “cmd” in the “Run” window. This will open the Windows command line, in which you need to enter the command:

tracert

For example, let's take the site google.ru

Tracing in Linux

In operating systems of the Linux family - Ubuntu, Fedora, CentOS, etc. - to start route tracing in you need to open the system console and enter the command:

traceroute<имя_сервера>

Attention! You cannot use network route tracing to assess the quality of the last mile (ADSL, FTTB or PON subscriber line), since this system program cannot and does not in any way assess the quality of the line.

Instructions

A program for tracing the routes of information packets is included in almost every network operating system. In Windows OS it is tracert, and in GNU/Linux and Mac OS it is traceroute. The operating principle of this program is as follows: The program sends packets of information to the address specified to it, setting deliberately impossible delivery conditions - a very short packet lifetime (TTL - Time To Live). When the first packet is sent, it is 1 second. Each server on the way from your computer to the desired address must reduce this value by at least one. Therefore, the packet’s lifetime will expire on the first node and it will not transmit it further, but will send a notification to the sender about the impossibility of delivery. In this way, the tracer will obtain information about the first intermediate node. It will then increase the packet lifetime by one and resend the packet. This request will live until the second node and the situation is . Thus, the tracing program will compile a list of all intermediate nodes, and if it does not receive notification from any one, then this will mean one of two things - either the packet was still delivered to the recipient, or this node does not execute. To find out, it will send a request with another defect - a obviously non-existent port number will be indicated. If this packet returns indicating an error, then the node is working normally and it is the recipient, and if not, then there is a break in the packet delivery chain on this node. In any case, the tracing procedure will be completed.

In Windows OS, the executable file of this program (tracert.exe) is stored in the WINDOWSsystem32 folder on the system drive of your computer. But to run the program there is no need to search for the file. This program is controlled from the command line only, so you must first launch a command line terminal. To do this, in the main menu (on the “Start” button), select “Run” to open the “Run a program” dialog box. You can also open it by pressing the WIN + R key combination. Then type “cmd” (without quotes) and press the “OK” button (or the Enter key). In the terminal that opens, type tracert and, separated by a space, the address of the node on the network to which you want to trace. This can be either an IP address or a domain name. The http protocol does not need to be specified. After the tracing is completed, the result can be copied - press CTRL + A to select everything and Enter to copy the selection to RAM. Then you can paste what you copied into any document in any text editor.

The trace operation writes to an operating system file specific SQL statements and their associated information (query plans and event waits) that are executed while the script is running. You can trace any arbitrary session in the Oracle database.

Instructions

Before that, you need to enable statistics collection, otherwise files with zero times will appear. To do this you need: alter system set timed_statistics=true If you need to run tracing in the current session, then the system parameter should be replaced with session.

Make sure that the maximum dump file size attribute is set to a sufficient value. To do this, run the corresponding SQL query: SELECT value FROM v$param p WHERE name=’max_dump_file_size’The $param value can be set both at the database level (alter system) and at the session level (alter session).

To start tracing, event 1046 must be set in the appropriate session. Run the sys.dbms_system.set_ev procedure, and then pass the resulting sid and serial values ​​as integer parameters: BEGIN sys.dbms_system.set_ev(sid, serial#, 10046, 8, ''); END

To turn off tracing, change the level value of event 10046 from 8 to 0.

The trace file appears in the Oracle database dump directory (Oracle/admin/databaseSID/udump). The name of this file contains the identifier of the OS process in which the operation was performed, and the extension is .trc. In order to process the information into a readable form, process the trace file in the tkprof:cd utility C:ORACLEadmindatabaseSIDudump
tkprof file.trc output=my_file.prf The processed file will contain a list of all commands that were executed during the session.

Helpful advice

The minimum level for executing command 10046 is 1, and the maximum is 12, at which the values ​​of all process-related variables are added, as well as information about expectations.

Websites on the network do not appear by themselves - they are created and maintained by computers called servers, and these servers are managed by an organization - a provider or hosting provider. And so that everything is clearly and accurately reproduced for everyone, the provider monitors its network equipment, servers, communication channels through which information and other various data are transmitted directly to users. In turn, the user can diagnose his Internet connection if he cannot obtain this information in order to determine whether the hosting or the provider through which the Internet access is provided is at fault. Tracing the route from a personal computer to the required site helps in such diagnostics.

Instructions

Perform a trace using the traceroute command in Windows-tracert. To trace a route, do the following: open the “Start” menu – “Run”. Type cmd.exe and select OK.

In the command line, type the command tracert server_name (the server name is indicated in the welcome email when ordering the service). Wait for the command to complete, then right-click in the Command Prompt window, select Select All, then (once selected) press Enter. Next, in order to see the trace, right-click, then click “Insert” in the message input field.

With the tracert command, you send data packets to the address you specify - this can be a server address, a computer name on the network, or an IP address. In this case, packets pass through special routers - network devices between the personal computer and the recipient. With this action, you determine the route to the final destination and, most importantly, calculate the response time (value in milliseconds) of each intermediate node.

In those sections where the response time is shortest, transmission is carried out as quickly as possible - this means that the channel is free and information is delivered without any interference. In the place where the response time reaches a maximum of some standardized value, we see the consequence “The waiting interval for the request has been exceeded,” which is equivalent to the loss of information packets.

In this way, it is possible to calculate at which specific connection point the problem exists. If the data does not reach the recipient itself, then the problem lies with him. If the connection stops in the middle, the problem is in one of the intermediate network devices. At the same time, from another PC or along a different route (if there is one), your site that has not opened may turn out to be quite accessible. If the information does not leave the boundaries of your provider's network, then the problem is with it.

Video on the topic

Tracing completes the design of the electronic equipment and defines the lines that connect the components that make up the designed device. It includes specific steps to execute a program and stop at commands, lines. Tracing tasks are labor-intensive due to the variety of technological methods for making connections.

Instructions

Use a special tracing program that probably already exists in your network operating system. If it's Windows, then the program is called tracert; On GNU/Linux and Mac OS operating systems, tracing can be done using traceroute. In this case, the packet information is sent to the address specified for it. Specifically set delivery parameters that are not feasible, for example, the packet lifetime is too short. For the first packet, it is better to set it to one second.

Make sure that each server located on the segment from your computer to the given address necessarily reduces this value by one. Thus, the packet's lifetime expires immediately at the first node of the route, which will then automatically send a notification that it is impossible to deliver the packet containing the data. Thanks to this circumstance, the tracing program will have access to information about the first intermediate node.

Increase the information packet life by one and try again. Now the second intermediate node will not be able to send it further and will be forced to send a non-delivery report. Repeat these steps, increasing the packet life by one each time. Using these steps, the tracing program will compile a list of all nodes contained in the interval from the computer to the final address.

Check the correct functioning of all intermediate points. If the program does not receive notification from one of the points, it will send a request with the following defect: the port number does not exist. When the packet returns indicating an error, this will indicate normal operation of the node. If this does not happen, there is a break at the node. End the tracing program.

Video on the topic

converting a raster (pixel) image into a vector one (where the image is described using mathematical formulas).

Tracing can be carried out either automatically or manually. Some vector graphics editors have built-in automatic tracing functions, but the result is a file with a large number of control points that is difficult to use. However, if you have a raster file that needs to be printed at a large size (for example, stretching a regular photo for a poster on the wall of a building), then auto-tracing followed by upscaling will be the only solution. Manual tracing is tracing the contours of the desired image using the tools available in the program for creating Bezier curves.

Tracing in programming

Step-by-step execution of a program with changes in all parameters or stopping at each operation is also traced. It may be needed if you are debugging your own code. Sometimes the algorithm is correct, but for some reason it doesn't work. It is the tracing that allows you to understand at what stage the error occurs. The tracing method also helps to understand someone else's code.

Ray tracing

Ray tracing, or path tracing, is a rendering technique (creating an image from a 3D model) in computer graphics that is related to geometric optics. It allows you to construct an image based on knowledge of the laws of how individual rays of light interact with existing surfaces. In ray tracing, the software's algorithm sends rays out of a "camera" and they bounce off different surfaces until they are absorbed or scattered. The more rays were traced, the better quality the result will be.

This rendering method produces images of the best quality, but requires powerful computing resources. However, some effects simply cannot be recreated using other rendering methods, so sometimes ray tracing is the only possible solution.

Tracing as building connections

Tracing also means finding lines that will connect the nodal points of a system. If you are designing a computer board (for example, a video card), then tracing in this process is finding the lines that will connect the contacts of the board elements.

How to trace

It is no secret that any website is hosted on a specific server and by entering the address of the required site in the address bar of the installed browser, and then clicking the “go” button, the user sends a request to the server. On the way to the site, the request passes through intermediate communication nodes. If they function normally, then the resource is loaded in the browser.

When the site does not load, it means that the sent request could not be received due to problems at one of the communication nodes. Route tracing will help you understand which part of the communication channel causes the request to be lost.

How to do a site trace

Next I will tell you how to do route tracing in Windows OS. To do this, we will need to use the Tracert utility, which, similar to the ping program, is launched from the command line. To get into it, you can use one of the three methods I suggest:

2. Use the key combination Win+R, which opens a window as in the first method. Then all actions are the same.

A window with a black background will open, where you need to type a command in the form tracert site_name (as an example: tracert yahoo.com) and confirm the entry with the Enter key. If you know the IP address of the resource, then instead of the domain name, you can enter it. By entering the address, a route to the destination node is established. The command line window displays the results of the trace in real time: IP addresses and names of intermediate nodes, as well as response times displayed in milliseconds.

If the names of any intermediate nodes are not interesting, then the route trace must be performed with the addition of the –d parameter, which allows you to hide the names of the routers. This is what an example request looks like: tracert -d yahoo.com.

The response time characterizes the load on the dedicated channel. With a long response time, the site will load, but it will be very difficult. But if a message appears warning that the request timeout has been exceeded, then data loss is observed on a specific node. Therefore, this node is problematic.

Thus, route tracing allows you to identify problems on nodes. If the data arrives normally, but it is lost at the destination node, then the problem is with the site. If the trace breaks in the middle of the route, there is a problem with the intermediate router. If packets are lost in the network of the provider you use, then this problem is resolved directly with him.