System Maintaining And Debugging; System Maintaining And Debugging Overview; Introduction To System Maintaining - 3Com 4500G Family Configuration Manual

24/48 port
Hide thumbs Also See for 4500G Family:
Table of Contents

Advertisement

1

System Maintaining and Debugging

When maintaining and debugging the system, go to these sections for information you are interested in:

System Maintaining and Debugging Overview

System Maintaining and Debugging
System Maintaining Example
System Maintaining and Debugging Overview

Introduction to System Maintaining

You can use the ping command and the tracert command to verify the current network connectivity.
The ping command
You can use the ping command to verify whether a device with a specified address is reachable, and to
examine network connectivity.
The ping command involves the following steps in its execution:
1)
The source device sends an ICMP echo request to the destination device.
2)
If the network is functioning properly, the destination device responds by sending an ICMP echo
reply to the source device after receiving the ICMP echo request.
3)
If there is network failure, the source device displays timeout or destination unreachable.
4)
The source device displays related statistics.
Output of the ping command falls into the following:
The ping command can be applied to the destination's name or IP address. If the destination's
name is unknown, the prompt information is displayed.
Information on the destination's responses towards each ICMP echo request. If the source device
does not receive an ICMP echo reply within the timeout time, it displays the prompt information. If
the source device receives an ICMP echo reply within the timeout time, it displays the number of
bytes of the echo reply, the message sequence number, Time to Live (TTL), the response time,
and the statistics during the ping operation. The statistics include number of packets sent, number
of echo reply messages received, percentage of packets not responded to the total packets sent,
and the minimum, average, and maximum response time.
The tracert command
By using the tracert command, you can trace the Layer 3 devices involved in delivering a packet from
source to destination. This is useful for identification of failed node(s) in the event of network failure.
The tracert command involves the following steps in its execution:
1)
The source device sends a packet with a TTL value of 1 to the destination device.
1-1

Hide quick links:

Advertisement

Chapters

Table of Contents
loading

Table of Contents