SlideShare una empresa de Scribd logo
1 de 30
Computer Networks
Unit - 8
Troubleshooting Network
Date:
Presented By:
Rubal Sagwal
Department of Computer Engineering
1Rubal_CN
Contents
• Network Troubleshooting
• Network Utilities
• Ipconfig
• Ping
• Tracert
• Nslookup
• Arp
• Netstat
• Nbtstat
Rubal_CN 2
Troubleshooting Network
Network and Internet Troubleshooting
Rubal_CN 3
Troubleshooting Network
• Network troubleshooting is the collective measures and
processes used to identify, diagnose and resolve
problems and issues within a computer network.
• It is a systematic process that aims to resolve problems
and restore normal network operations within the
network.
• Network troubleshooting is primarily done by network
engineers or administrators to repair or optimize a
network. It is generally done to recover and establish
network or Internet connections on end nodes/devices.
• Link: https://youtu.be/0-eefKkafhs
Rubal_CN 4
Troubleshooting Network
Some of the processes within network troubleshooting
include but are not limited to:
• Finding and resolving problems and establishing
Internet/network connection of a computer/device/node
• Configuring a router, switch or any network management
device
• Installing cables or Wi-Fi devices
• Updating firmware devices on router switch
• Removing viruses
• Adding, configuring and reinstalling a network printer
Network troubleshooting can be a manual or automated
task. When using automated tools, network
management can be done using network diagnostic
software.
Rubal_CN 5
Network Utilities
Ipconfig – ping – tracert – nslookup – arp – netstat - nbtstat
Rubal_CN 6
Network Utilities
• Network Utilities – provides a variety tools that can
be used related to computer network information
gathering and analysis.
• Network Utility shows information about each of
your network connections, including the Mac
Address of the interface, the IP addresses assigned
to it, its speed and status, a count of
data packets sent and received, and a count of
transmission errors and collisions.
Rubal_CN 7
Contd…
Network Utilities
Examples of what the Network Utility can help with:
• Check your network connection
• View network routing tables and statistics
• Test whether you can contact another computer
• Test your DNS server
• Trace the paths of your network traffic
• Check for open TCP ports
Rubal_CN 8
Ipconfig
• Ipconfig (sometimes written as IPCONFIG) is a
command line tool used to control the network
connections on Windows NT/2000/XP machines.
• Ipconfig displays all current TCP/IP network
configuration values and refreshes Dynamic Host
Configuration Protocol (DHCP) and Domain Name
System (DNS) settings.
• Displays current info of your network
• IP address of system
• Ip add of router
Rubal_CN 9
Ipconfig
The syntax for using ipconfig is:
>ipconfig /parameter_name.
For example, "ipconfig /all" displays the entire TCP/IP
configuration of all available network adapters.
Rubal_CN 10
ipconfig
Rubal_CN 11
ipconfig/all
Rubal_CN 12
ping
Rubal_CN 13
• Ping is a basic Internet program that allows a user to verify
that a particular IP address exists and can accept requests.
• Ping is used diagnostically to ensure that a host computer
the user is trying to reach is actually operating. Ping works
by sending an Internet Control Message Protocol (ICMP)
Echo Request to a specified interface on the network and
waiting for a reply. Ping can be used for troubleshooting to
test connectivity and determine response time.
• Allow you to send a signal to another device, if a device is
active it will send you reply back.
• It’s a subset of ICMP.
• Echo request
• Echo response
ping
Rubal_CN 14
• As a verb, ping means "to get the attention of" or "to
check for the presence of" another party online. The
computer acronym (for Packet Internet or Inter-
Network Groper) was contrived to match the
submariners' term for the sound of a returned sonar
pulse.
• Tip: To find out the dot address (such as
205.245.172.72) for a given domain name, Windows
users can go to their command prompt screen
(start/run/cmd) and enter ping xxxxx.yyy (where xxxxx
is the second-level domain name like "whatis" and yyy
is the top-level domain name like "com").
Ping – options
Rubal_CN 15
Ping – with ip address – when active
Rubal_CN 16
Ping – with ip address – when device is not
active
Rubal_CN 17
Ping – google
Rubal_CN 18
Tracert/ Traceroute
Rubal_CN 19
• Trace the route to HOST
• Tracert is a Windows based command-line tool that you can
use to trace the path that an Internet Protocol (IP) packet
takes to its destination from a source.
• Tracert will determine the path taken to a destination. It
does this by sending Internet Control Message Protocol
(ICMP) Echo Request messages to the destination.
• When sending traffic to the destination, it will incrementally
increase the Time to Live (TTL) field values to aid in finding
the path taken to that destination address. The path is
outlined from this process.
• Ref:
https://www.mediacollege.com/internet/troubleshooter/tra
ceroute.html
Tracert
Rubal_CN 20
Tracert - google
Rubal_CN 21
nslookup
Rubal_CN 22
• Query the nameserver for the IP address of the
given HOST optionally using a specified DNS
server.
• nslookup is the name of a program that lets an
Internet server administrator or any computer user
enter a host name (for example, "whatis.com") and
find out the corresponding IP address. It will also
do reverse name lookup and find the host name for
an IP address you specify.
nslookup
Rubal_CN 23
• For example, if you entered “www.whatis.com" (which is one of the
TechTarget sites), you would receive as a response our IP address, which
happens to be : 192.168.34.1
• Or if you entered "192.168.34.1", it would return "sites.techtarget.com".
• nslookup sends a domain name query packet to a designated (or
defaulted) domain name system (DNS) server. Depending on the system
you are using, the default may be the local DNS name server at your
service provider, some intermediate name server, or the root server
system for the entire domain name system hierarchy.
• Using the Linux and possibly other versions of nslookup, you can locate
other information associated with the host name or IP address, such as
associated mail services. nslookup is included with some UNIX-based
operating systems and in later Windows systems. In Windows XP, the
command can be entered on the "Command prompt" screen. A more
limited alternative to nslookup for looking up an IP address is
the ping command.
nslookup
Rubal_CN 24
arp
Rubal_CN 25
• Address Resolution Protocol (ARP) is a protocol for mapping
an Internet Protocol address (IP address) to a physical
machine address that is recognized in the local network.
• For example, in IP Version 4, the most common level of IP in
use today, an address is 32 bits long.
• In an Ethernet local area network, however, addresses for
attached devices are 48 bits long. (The physical machine
address is also known as a Media Access Control or MAC
address.)
• A table, usually called the ARP cache, is used to maintain a
correlation between each MAC address and its
corresponding IP address. ARP provides the protocol rules
for making this correlation and providing address conversion
in both directions.
arp
Rubal_CN 26
netstat
Rubal_CN 27
• Print network connections, routing tables, interface
statistics, masquerade connections, and multicast
memberships.
• Netstat is a common command
line TCP/IP networking utility available in most versions
of Windows, Linux, UNIX and other operating systems.
Netstat provides information and statistics
about protocols in use and current TCP/IP network
connections. (The name derives from the
words network and statistics.)
• Ref:
https://searchnetworking.techtarget.com/definition/ne
tstat
netstat
Rubal_CN 28
nbtstat
Rubal_CN 29
• Displays NetBIOS over TCP/IP (NetBT) protocol
statistics, NetBIOS name tables for both the local
computer and remote computers, and the NetBIOS
name cache.
• nbtstat allows a refresh of the NetBIOS name cache
and the names registered with Windows Internet
Name Service (WINS). Used without
parameters, nbtstat displays help.
• Ref: https://docs.microsoft.com/en-us/windows-
server/administration/windows-commands/nbtstat
nbtstat
Rubal_CN 30

Más contenido relacionado

La actualidad más candente

Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic Configuration
Prof. Erwin Globio
 
IP Configuration
IP ConfigurationIP Configuration
IP Configuration
Stephen Raj
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
Touhidul Fahim
 
Remote access service
Remote access serviceRemote access service
Remote access service
Apoorw Pandey
 

La actualidad más candente (20)

Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Troubleshooting Your Network.pptx
Troubleshooting Your Network.pptxTroubleshooting Your Network.pptx
Troubleshooting Your Network.pptx
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
 
Identify and resolve network problems
Identify and resolve network problemsIdentify and resolve network problems
Identify and resolve network problems
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic Configuration
 
IP Configuration
IP ConfigurationIP Configuration
IP Configuration
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configuration
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
Routing ppt
Routing pptRouting ppt
Routing ppt
 
System Administration
System AdministrationSystem Administration
System Administration
 
Chapter12 -- troubleshooting networking problems
Chapter12  -- troubleshooting networking problemsChapter12  -- troubleshooting networking problems
Chapter12 -- troubleshooting networking problems
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Hot standby router protocol (hsrp) using
Hot standby router protocol (hsrp) usingHot standby router protocol (hsrp) using
Hot standby router protocol (hsrp) using
 
Network configuration and simulation
Network configuration and simulationNetwork configuration and simulation
Network configuration and simulation
 
Router configuration
Router configurationRouter configuration
Router configuration
 
Remote access service
Remote access serviceRemote access service
Remote access service
 
Vlan
Vlan Vlan
Vlan
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
DHCP & DNS
DHCP & DNSDHCP & DNS
DHCP & DNS
 
Server configuration
Server configurationServer configuration
Server configuration
 

Similar a Troubleshooting Network and Network Utilities

Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
GLIM Digital
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
Cengage Learning
 
Installation Of An Iso Image Dvd
Installation Of An Iso Image DvdInstallation Of An Iso Image Dvd
Installation Of An Iso Image Dvd
Susan Cox
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
eyebolloptics
 

Similar a Troubleshooting Network and Network Utilities (20)

Commands.pptx
Commands.pptxCommands.pptx
Commands.pptx
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
 
MVA slides lesson 5
MVA slides lesson 5MVA slides lesson 5
MVA slides lesson 5
 
98 366 mva slides lesson 5
98 366 mva slides lesson 598 366 mva slides lesson 5
98 366 mva slides lesson 5
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
Network troubleshooting
Network troubleshootingNetwork troubleshooting
Network troubleshooting
 
Command.pptx presentation
Command.pptx presentationCommand.pptx presentation
Command.pptx presentation
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
 
Commands
CommandsCommands
Commands
 
networking.pptx
networking.pptxnetworking.pptx
networking.pptx
 
Introduction to Networking Commands & Software
Introduction to  Networking Commands & SoftwareIntroduction to  Networking Commands & Software
Introduction to Networking Commands & Software
 
Basic network training2
Basic network training2Basic network training2
Basic network training2
 
Installation Of An Iso Image Dvd
Installation Of An Iso Image DvdInstallation Of An Iso Image Dvd
Installation Of An Iso Image Dvd
 
NETWORKING COMMANDS.pptx
NETWORKING COMMANDS.pptxNETWORKING COMMANDS.pptx
NETWORKING COMMANDS.pptx
 
Linux network tools (Maarten Blomme)
Linux network tools (Maarten Blomme)Linux network tools (Maarten Blomme)
Linux network tools (Maarten Blomme)
 
Link i pv4
Link i pv4Link i pv4
Link i pv4
 
Learning series fundamentals of Networking and Medical Imaging
Learning series fundamentals of Networking and Medical ImagingLearning series fundamentals of Networking and Medical Imaging
Learning series fundamentals of Networking and Medical Imaging
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
 
Nnnnnn
NnnnnnNnnnnn
Nnnnnn
 

Más de Rubal Sagwal

Más de Rubal Sagwal (20)

Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Cloud and Virtualization Security
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization Security
 
Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)
 
ER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMSER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMS
 
Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...
 
Overview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and ArchitectureOverview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and Architecture
 
Practical Implementation of Virtual Machine
Practical Implementation of Virtual MachinePractical Implementation of Virtual Machine
Practical Implementation of Virtual Machine
 
Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software
 
Accessing virtualized published applications
Accessing virtualized published applicationsAccessing virtualized published applications
Accessing virtualized published applications
 
Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization      Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization
 
Managing Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine ResourcesManaging Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine Resources
 
Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms
 
Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation
 
Principles of virtualization
Principles of virtualizationPrinciples of virtualization
Principles of virtualization
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
 
Basics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerBasics of Network Layer and Transport Layer
Basics of Network Layer and Transport Layer
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
 
Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP model
 

Último

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Último (20)

A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 

Troubleshooting Network and Network Utilities

  • 1. Computer Networks Unit - 8 Troubleshooting Network Date: Presented By: Rubal Sagwal Department of Computer Engineering 1Rubal_CN
  • 2. Contents • Network Troubleshooting • Network Utilities • Ipconfig • Ping • Tracert • Nslookup • Arp • Netstat • Nbtstat Rubal_CN 2
  • 3. Troubleshooting Network Network and Internet Troubleshooting Rubal_CN 3
  • 4. Troubleshooting Network • Network troubleshooting is the collective measures and processes used to identify, diagnose and resolve problems and issues within a computer network. • It is a systematic process that aims to resolve problems and restore normal network operations within the network. • Network troubleshooting is primarily done by network engineers or administrators to repair or optimize a network. It is generally done to recover and establish network or Internet connections on end nodes/devices. • Link: https://youtu.be/0-eefKkafhs Rubal_CN 4
  • 5. Troubleshooting Network Some of the processes within network troubleshooting include but are not limited to: • Finding and resolving problems and establishing Internet/network connection of a computer/device/node • Configuring a router, switch or any network management device • Installing cables or Wi-Fi devices • Updating firmware devices on router switch • Removing viruses • Adding, configuring and reinstalling a network printer Network troubleshooting can be a manual or automated task. When using automated tools, network management can be done using network diagnostic software. Rubal_CN 5
  • 6. Network Utilities Ipconfig – ping – tracert – nslookup – arp – netstat - nbtstat Rubal_CN 6
  • 7. Network Utilities • Network Utilities – provides a variety tools that can be used related to computer network information gathering and analysis. • Network Utility shows information about each of your network connections, including the Mac Address of the interface, the IP addresses assigned to it, its speed and status, a count of data packets sent and received, and a count of transmission errors and collisions. Rubal_CN 7
  • 8. Contd… Network Utilities Examples of what the Network Utility can help with: • Check your network connection • View network routing tables and statistics • Test whether you can contact another computer • Test your DNS server • Trace the paths of your network traffic • Check for open TCP ports Rubal_CN 8
  • 9. Ipconfig • Ipconfig (sometimes written as IPCONFIG) is a command line tool used to control the network connections on Windows NT/2000/XP machines. • Ipconfig displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. • Displays current info of your network • IP address of system • Ip add of router Rubal_CN 9
  • 10. Ipconfig The syntax for using ipconfig is: >ipconfig /parameter_name. For example, "ipconfig /all" displays the entire TCP/IP configuration of all available network adapters. Rubal_CN 10
  • 13. ping Rubal_CN 13 • Ping is a basic Internet program that allows a user to verify that a particular IP address exists and can accept requests. • Ping is used diagnostically to ensure that a host computer the user is trying to reach is actually operating. Ping works by sending an Internet Control Message Protocol (ICMP) Echo Request to a specified interface on the network and waiting for a reply. Ping can be used for troubleshooting to test connectivity and determine response time. • Allow you to send a signal to another device, if a device is active it will send you reply back. • It’s a subset of ICMP. • Echo request • Echo response
  • 14. ping Rubal_CN 14 • As a verb, ping means "to get the attention of" or "to check for the presence of" another party online. The computer acronym (for Packet Internet or Inter- Network Groper) was contrived to match the submariners' term for the sound of a returned sonar pulse. • Tip: To find out the dot address (such as 205.245.172.72) for a given domain name, Windows users can go to their command prompt screen (start/run/cmd) and enter ping xxxxx.yyy (where xxxxx is the second-level domain name like "whatis" and yyy is the top-level domain name like "com").
  • 16. Ping – with ip address – when active Rubal_CN 16
  • 17. Ping – with ip address – when device is not active Rubal_CN 17
  • 19. Tracert/ Traceroute Rubal_CN 19 • Trace the route to HOST • Tracert is a Windows based command-line tool that you can use to trace the path that an Internet Protocol (IP) packet takes to its destination from a source. • Tracert will determine the path taken to a destination. It does this by sending Internet Control Message Protocol (ICMP) Echo Request messages to the destination. • When sending traffic to the destination, it will incrementally increase the Time to Live (TTL) field values to aid in finding the path taken to that destination address. The path is outlined from this process. • Ref: https://www.mediacollege.com/internet/troubleshooter/tra ceroute.html
  • 22. nslookup Rubal_CN 22 • Query the nameserver for the IP address of the given HOST optionally using a specified DNS server. • nslookup is the name of a program that lets an Internet server administrator or any computer user enter a host name (for example, "whatis.com") and find out the corresponding IP address. It will also do reverse name lookup and find the host name for an IP address you specify.
  • 23. nslookup Rubal_CN 23 • For example, if you entered “www.whatis.com" (which is one of the TechTarget sites), you would receive as a response our IP address, which happens to be : 192.168.34.1 • Or if you entered "192.168.34.1", it would return "sites.techtarget.com". • nslookup sends a domain name query packet to a designated (or defaulted) domain name system (DNS) server. Depending on the system you are using, the default may be the local DNS name server at your service provider, some intermediate name server, or the root server system for the entire domain name system hierarchy. • Using the Linux and possibly other versions of nslookup, you can locate other information associated with the host name or IP address, such as associated mail services. nslookup is included with some UNIX-based operating systems and in later Windows systems. In Windows XP, the command can be entered on the "Command prompt" screen. A more limited alternative to nslookup for looking up an IP address is the ping command.
  • 25. arp Rubal_CN 25 • Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address that is recognized in the local network. • For example, in IP Version 4, the most common level of IP in use today, an address is 32 bits long. • In an Ethernet local area network, however, addresses for attached devices are 48 bits long. (The physical machine address is also known as a Media Access Control or MAC address.) • A table, usually called the ARP cache, is used to maintain a correlation between each MAC address and its corresponding IP address. ARP provides the protocol rules for making this correlation and providing address conversion in both directions.
  • 27. netstat Rubal_CN 27 • Print network connections, routing tables, interface statistics, masquerade connections, and multicast memberships. • Netstat is a common command line TCP/IP networking utility available in most versions of Windows, Linux, UNIX and other operating systems. Netstat provides information and statistics about protocols in use and current TCP/IP network connections. (The name derives from the words network and statistics.) • Ref: https://searchnetworking.techtarget.com/definition/ne tstat
  • 29. nbtstat Rubal_CN 29 • Displays NetBIOS over TCP/IP (NetBT) protocol statistics, NetBIOS name tables for both the local computer and remote computers, and the NetBIOS name cache. • nbtstat allows a refresh of the NetBIOS name cache and the names registered with Windows Internet Name Service (WINS). Used without parameters, nbtstat displays help. • Ref: https://docs.microsoft.com/en-us/windows- server/administration/windows-commands/nbtstat