Under the DOS Microsoft  Network  The Client and Windows  9 x environment such as DOS window, there are many useful but not included in the DOS's own network commands in the command. So, what are the commands? To introduce below them in the commonly used commands.
Arp
display and modify the address resolution protocol (Arp)   Used to Ethernet   IP  Or token ring physical address translation table. This command only when installed   TCP/IP  Is only available after the deal.
arp  - a  [inet_addr]   [- N  [if_addr]]
arp  - d  Inet_addr   [if_addr]
arp  - s  Inet_addr   Ether_addr   Parameters [if_addr]


- a through inquiry   TCP/IP  Display the current   ARP  Item. If you specify the   Inet_addr, show only the designated computer   IP  And the physical address.

- g with   - a  Is the same.
inet_addr
to add a decimal marker specified   IP  Address.

- N showed by   If_addr   The specified network interface   ARP  Item.
if_addr
specifies the need to modify the address translation table interface   IP  Address (if any). If not, the first applicable interface will be used.  

- d deleted by   Inet_addr   The specified item.

- s in   ARP  , item is added to the cache will   IP  Address   Inet_addr   And the physical address   Ether_addr   Association. Physical address can be separated by a hyphen   6   Given a hexadecimal bytes. Use decimal marker points specified   IP  Address. Item is permanent, that is the consequent automatically deleted from the cache timeout expires.
ether_addr
specifies a physical address.
Finger
in running   Finger  Services specified on the system display information about the user. According to the different variables of remote system output. This command only when installed   TCP/IP  Is only available after the deal.
finger  [l]   [user] @ computer [...]

parameters -l
display the information in the long list format.  
user
specifies the user to obtain relevant information. Omit the user parameter to display all users of the information on the specified computer:
@ computer

Ftp to transfer files to the running   FTP  Services of the remote computer or from the running   FTP  Remote computer file transfer service (sometimes called   daemon). Ftp  Can be used in interaction. Click related topics in the list of "ftp  command" for "FTP" subcommand description available. This command only when installed   TCP/IP  Is only available after the deal. Ftp  Is a service, once started, will be created in which you can use   Ftp  Command of the environment, by typing   Quit  Subcommand can from the child to return to the environment   Windows  2000   Command prompt.
when   Ftp  The runtime environment, it is   Ftp  Command prompt.
ftp  [v]   [-n]   (-i)   [-d]   [] - g   [-s: filename]   [to a]   - w: windowsize]   Parameters [computer]


- v banned according to the remote server response.

- n automatically login to the initial connection is prohibited.
-
I close interactive prompts when multiple file transfer.

- d to enable debugging, all show that passed between the client and the server   Ftp  Command.

- g disables filename, it allows in a local file and path names use wildcard characters (*,   and  ?) . (please refer to the online "command reference" in   glob  command.) :
- s   Filename specified contains
  Ftp  Command text file; When   Ftp  After start-up, these commands will run automatically. No Spaces are allowed in this parameter. Use the switch rather than redirecting   (> ) .

- a use any local interface when binding data connection.
- w: windowsize
instead of the default size for   4096   The transmit buffer.
computer
specifies the computer to connect to the remote computer or   IP  Address. If specified, the computer must be the last parameter.

Nbtstat the diagnostic command USES   NBT (  on the TCP/IP  NetBIOS) displays protocol statistics and current   TCP/IP  The connection. This command only when installed   TCP/IP  Is only available after the deal.
nbtstat  [- a  remotename]  /- A  IP  address   [-] c   [-n]   [-r]   [-r]   [-s]   [-s]   Parameters (interval)

- a  Remotename
use the name of the remote computer is out of the name list.
- A  IP  The address
use remote computer   IP  Address and list the name list.

- c given each name   IP  Address lists   NetBIOS  Name of the contents of the cache.

- n list the local   NetBIOS  The name. "Registered" indicates that the name has been broadcasting   (Bnode)   Or   WINS (the other node types) to register.

- R clear   NetBIOS  After all the name name in the cache, repack   Lmhosts  File.

- r list   Windows  The network name resolution name resolution statistics. In the configuration to use   WINS  The   Windows  2000   Computer, this option returns to broadcast or   WINS  To parse and the name of the registered number.

- S according to the client and the server session, only through   IP  Address lists the remote machine.

- s according to the client and the server session. Try to remote computers   IP  Address translation into using the names of the hosts file.
the interval
to display the selected statistics, in the pause between each display   Interval  Seconds. According to   CTRL + C  Stop redisplaying statistics. If you omit this parameter, nbtstat  Print the current configuration information at a time.
Netstat
displays protocol statistics and current   TCP/IP  Network connection. This command only when installed   TCP/IP  Can be used only after agreement.
netstat  [to a]   [e]   [-n]   [-s]   [- p  protocol]   [-r]   Parameters (interval)

-
a displays all connections and listening ports. Usually does not display the server connection.

- e displays Ethernet statistics. This parameter can be with   - s  Option used in combination.

- n shows address and port number in digital format (rather than trying to find the name).

- s shows that each protocol statistics. By default, the display   TCP, UDP, ICMP  And   IP  The statistics. - p  A subset of the set of options that can be used to specify a default.  
- p  Protocol
show by   Protocol  Specified in the agreement of the connection; Protocol  Can be   Tcp  Or   The udp. If with   - s  Options using the display together each protocol statistics, protocol  Can be   TCP, udp, icmp  Or   IP.

- r displays the contents of a routing table.
the interval
to display the selected statistics, pause between each display   Interval  Seconds. According to   CTRL + B  Stop redisplaying statistics. If you omit this parameter, netstat  Will be printed once the current configuration information.
Ping
authentication with the remote computer connection. This command only when installed   TCP/IP  Can be used only after agreement.
ping  [-t]   [to a]  /- n  count  /- l  length   [-] f   [- i  TTL]   [- v  tos]  /- r  count  /- s  count   [[] - j  computer - list   |   [- k  computer - the list]]   [- w  a timeout]   Parameters of destination - a list


- t Ping  Specify the computer until the interrupt.

- a address resolution will provide the computer name.
- n  Count
send   Count  Specified   ECHO  Number of data packets. The default value is   4.
- l  Length
send contains by   Length  Specify the amount of data   ECHO  Packets. Defaults to   32   Bytes; Maximum is   65527.

- f send set don't fragment flag in packet. Packet routing on the gateway will not be segmented.
- i  TTL
sets the "survival time" field to   Ttl  The specified value.
- v  Tos
sets the "service type" field to   Tos  The specified value.
- r  Record route count
in the field in the record and return packet routing. Count  You can specify a minimum   1   Taiwan, most   Computer.
assigned to   Ping  The remote computer.
the Rcp
in   Windows  2000   Computer and run the remote shell port monitor   Rshd  Copy files between systems. Rcp  Command is a connect command, from   Windows  2000   Computer issue the command, can also be used to run on two other transmission   Rshd  To copy files between computers. Rshd  Port monitor can be in   UNIX  Computer use, while in   Windows  2000   Can't use, so   Windows  2000   Participate in computer only can be used as a command system. The remote computer must also by running   Rshd  Provide   Rcp  Utility.
rcp  [] - a  |   - b   [-h]   [-r]   Source1   Source2   ...   SourceN  Destination


- a specifies the   ASCII  Transfer mode. This pattern on outgoing documents carriage return/line breaks into a carriage return and line breaks in the incoming file is converted into a carriage return/line breaks. This mode as the default mode of transport.

- b specifies binary image transfer mode. No performs carriage return/line feed character conversions.

- h transmission   Windows  2000   Marked as hidden attribute the source file on your computer. Without this option, in   Rcp  Specified on the command line as the effect of the hidden files and file does not exist.

- r the source of all subdirectories recursively copied to the target content. Source  And   Destination  Must be directory, although even if the source is not a directory, use   - r  Can also work. But there will be no recursion.
source  And   Destination
format must be   Computer. [user] : filename. If you ignore the   [computer. [user] :]   Part, the computer will assume for the local computer. If you omit the   [user]   Part, will use the current login   Windows  2000   The user name. If you use the fully qualified computer name, including the period   (.)   Separator, it must be contain   [user]. Otherwise, the computer name of the last part will explain to the user name. If you specify multiple source files,   Destination  Must be a directory.  
if the file name is not on   UNIX  The forward slash   (/)   Or   Windows  2000   System of the backslash   (\)   Heading, it is assumed that relative to the current working directory. In   Windows  2000   Here's a list of orders. In remote systems, this is the remote user's login directory. Period   (.)   According to the current directory. 在远程路径中使用转义字符(\、" 或 '),以便在远程计算机中使用通配符。
Rexec
在运行 REXEC 服务的远程计算机上运行命令。rexec 命令在执行指定命令前,验证远程计算机上的用户名,只有安装了 TCP/IP 协议后才可以使用该命令。
rexec computer [-l username] [-n] command
参数
computer 
指定要运行 command 的远程计算机。
-l username 
指定远程计算机上的用户名。
-r
将 rexec 的输入重定向到 NULL。
command 
指定要运行的命令。
Route
控制网络路由表。该命令只有在安装了 TCP/IP 协议后才可以使用。
route [-f] [-p] [command [destination] [mask subnetmask] [gateway] [metric costmetric]]
参数
-f
清除所有网关入口的路由表。如果该参数与某个命令组合使用,路由表将在运行命令前清除。
-p
该参数与 add 命令一起使用时,将使路由在系统引导程序之间持久存在。默认情况下,系统重新启动时不保留路由。与 print 命令一起使用时,显示已注册的持久路由列表。忽略其他所有总是影响相应持久路由的命令。
command
指定下列的一个命令。
命令 目的 
print 打印路由 
add 添加路由 
delete 删除路由 
change 更改现存路由 
destination
指定发送 command 的计算机。
mask subnetmask
指定与该路由条目关联的子网掩码。如果没有指定,将使用 255.255.255.255。
gateway 
指定网关。
名为 Networks 的网络数据库文件和名为 Hosts 的计算机名数据库文件中均引用全部 destination 或 gateway 使用的符号名称。如果命令是 print 或 delete,目标和网关还可以使用通配符,也可以省略网关参数。
metric costmetric
指派整数跃点数(从 1 到 9999)在计算最快速、最可靠和(或)最便宜的路由时使用。
Rsh
在运行 RSH 服务的远程计算机上运行命令。该命令只有在安装了 TCP/IP 协议后才可以使用。
rsh computer [-l username] [-n] command
参数
computer
指定运行 command 的远程计算机。
-l username
指定远程计算机上使用的用户名。如果省略,则使用登录的用户名。
-n
将 rsh 的输入重定向到 NULL。
command
指定要运行的命令。
Tftp
将文件传输到正在运行 TFTP 服务的远程计算机或从正在运行 TFTP 服务的远程计算机传输文件。该命令只有在安装了 TCP/IP 协议后才可以使用。
tftp [-i] computer [get | put] source [destination]
参数
-i
指定二进制图像传送模式(也称为“八位字节”)。在二进制图像模式中,文件一个字节接一个字节地逐字移动。在传送二进制文件时使用该模式。
如果省略了 -i,文件将以 ASCII 模式传送。这是默认的传送模式。此模式将 EOL 字符转换为 UNIX 的回车符和个人计算机的回车符/换行符。在传送文本文件时应使用此模式。如果文件传送成功,将显示数据传输率。 
computer
指定本地或远程计算机。
put
将本地计算机上的文件 destination 传送到远程计算机上的文件 source。
get
将远程计算机上的文件 destination 传送到本地计算机上的文件 source。
如果将本地计算机上的文件 file-two 传送到远程计算机上的文件 file-one,请指定 put。如果将远程计算机上的文件 file-two 传送到远程计算机上的文件 file-one,请指定 get。
因为 tftp 协议不支持用户身份验证,所以用户必须登录,并且文件在远程计算机上必须可以写入。
source
指定要传送的文件。如果本地文件指定为 -,则远程文件在 stdout 上打印出来(如果获取),或从 stdin(如果放置)读取。
destination
指定将文件传送到的位置。如果省略了 destination,将假定与 source 同名。
Tracert
该诊断实用程序将包含不同生存时间 (TTL) 值的 Internet 控制消息协议 (ICMP) 回显数据包发送到目标,以决定到达目标采用的路由。要在转发数据包上的 TTL 之前至少递减 1,必需路径上的每个路由器,所以 TTL 是有效的跃点计数。数据包上的 TTL 到达 0 时,路由器应该将“ICMP  Has timed out "message is sent back to the source system. Tracert  first send   TTL  to   1   echo data packets, and during the next time will send process   TTL  increasing   1, until the target response or   TTL  maximum, so as to determine the route. Route by checking the intermediate routers send back" ICMP  Has timed out "message to determine routing. However, some router quietly underground transmission contains overdue   TTL  the value of the packets, and   tracert  see.
tracert  [-d]   [- h  maximum_hops]   [] - j  computer - list   [- w  a timeout]   target_name


/d specifies the address will not be resolved to a computer name.
- h  maximum_hops
specifies the search target the biggest jump points.
- j  computer - a list
specifies the   computer - list  sparse source routing.
- w  a timeout
every time reply waiting   timeout  specify the number of microseconds.
target_name
the name of the target computer.
in addition, there are IPCONFIG, DNR orders, there will no longer be introduced one by one.


This concludes the body part