SlideShare une entreprise Scribd logo
1  sur  30
Computer Networks
Unit - 8
Troubleshooting Network
Date:
Presented By:
Rubal Sagwal
Department of Computer Engineering
1Rubal_CN
Contents
• Network Troubleshooting
• Network Utilities
• Ipconfig
• Ping
• Tracert
• Nslookup
• Arp
• Netstat
• Nbtstat
Rubal_CN 2
Troubleshooting Network
Network and Internet Troubleshooting
Rubal_CN 3
Troubleshooting Network
• Network troubleshooting is the collective measures and
processes used to identify, diagnose and resolve
problems and issues within a computer network.
• It is a systematic process that aims to resolve problems
and restore normal network operations within the
network.
• Network troubleshooting is primarily done by network
engineers or administrators to repair or optimize a
network. It is generally done to recover and establish
network or Internet connections on end nodes/devices.
• Link: https://youtu.be/0-eefKkafhs
Rubal_CN 4
Troubleshooting Network
Some of the processes within network troubleshooting
include but are not limited to:
• Finding and resolving problems and establishing
Internet/network connection of a computer/device/node
• Configuring a router, switch or any network management
device
• Installing cables or Wi-Fi devices
• Updating firmware devices on router switch
• Removing viruses
• Adding, configuring and reinstalling a network printer
Network troubleshooting can be a manual or automated
task. When using automated tools, network
management can be done using network diagnostic
software.
Rubal_CN 5
Network Utilities
Ipconfig – ping – tracert – nslookup – arp – netstat - nbtstat
Rubal_CN 6
Network Utilities
• Network Utilities – provides a variety tools that can
be used related to computer network information
gathering and analysis.
• Network Utility shows information about each of
your network connections, including the Mac
Address of the interface, the IP addresses assigned
to it, its speed and status, a count of
data packets sent and received, and a count of
transmission errors and collisions.
Rubal_CN 7
Contd…
Network Utilities
Examples of what the Network Utility can help with:
• Check your network connection
• View network routing tables and statistics
• Test whether you can contact another computer
• Test your DNS server
• Trace the paths of your network traffic
• Check for open TCP ports
Rubal_CN 8
Ipconfig
• Ipconfig (sometimes written as IPCONFIG) is a
command line tool used to control the network
connections on Windows NT/2000/XP machines.
• Ipconfig displays all current TCP/IP network
configuration values and refreshes Dynamic Host
Configuration Protocol (DHCP) and Domain Name
System (DNS) settings.
• Displays current info of your network
• IP address of system
• Ip add of router
Rubal_CN 9
Ipconfig
The syntax for using ipconfig is:
>ipconfig /parameter_name.
For example, "ipconfig /all" displays the entire TCP/IP
configuration of all available network adapters.
Rubal_CN 10
ipconfig
Rubal_CN 11
ipconfig/all
Rubal_CN 12
ping
Rubal_CN 13
• Ping is a basic Internet program that allows a user to verify
that a particular IP address exists and can accept requests.
• Ping is used diagnostically to ensure that a host computer
the user is trying to reach is actually operating. Ping works
by sending an Internet Control Message Protocol (ICMP)
Echo Request to a specified interface on the network and
waiting for a reply. Ping can be used for troubleshooting to
test connectivity and determine response time.
• Allow you to send a signal to another device, if a device is
active it will send you reply back.
• It’s a subset of ICMP.
• Echo request
• Echo response
ping
Rubal_CN 14
• As a verb, ping means "to get the attention of" or "to
check for the presence of" another party online. The
computer acronym (for Packet Internet or Inter-
Network Groper) was contrived to match the
submariners' term for the sound of a returned sonar
pulse.
• Tip: To find out the dot address (such as
205.245.172.72) for a given domain name, Windows
users can go to their command prompt screen
(start/run/cmd) and enter ping xxxxx.yyy (where xxxxx
is the second-level domain name like "whatis" and yyy
is the top-level domain name like "com").
Ping – options
Rubal_CN 15
Ping – with ip address – when active
Rubal_CN 16
Ping – with ip address – when device is not
active
Rubal_CN 17
Ping – google
Rubal_CN 18
Tracert/ Traceroute
Rubal_CN 19
• Trace the route to HOST
• Tracert is a Windows based command-line tool that you can
use to trace the path that an Internet Protocol (IP) packet
takes to its destination from a source.
• Tracert will determine the path taken to a destination. It
does this by sending Internet Control Message Protocol
(ICMP) Echo Request messages to the destination.
• When sending traffic to the destination, it will incrementally
increase the Time to Live (TTL) field values to aid in finding
the path taken to that destination address. The path is
outlined from this process.
• Ref:
https://www.mediacollege.com/internet/troubleshooter/tra
ceroute.html
Tracert
Rubal_CN 20
Tracert - google
Rubal_CN 21
nslookup
Rubal_CN 22
• Query the nameserver for the IP address of the
given HOST optionally using a specified DNS
server.
• nslookup is the name of a program that lets an
Internet server administrator or any computer user
enter a host name (for example, "whatis.com") and
find out the corresponding IP address. It will also
do reverse name lookup and find the host name for
an IP address you specify.
nslookup
Rubal_CN 23
• For example, if you entered “www.whatis.com" (which is one of the
TechTarget sites), you would receive as a response our IP address, which
happens to be : 192.168.34.1
• Or if you entered "192.168.34.1", it would return "sites.techtarget.com".
• nslookup sends a domain name query packet to a designated (or
defaulted) domain name system (DNS) server. Depending on the system
you are using, the default may be the local DNS name server at your
service provider, some intermediate name server, or the root server
system for the entire domain name system hierarchy.
• Using the Linux and possibly other versions of nslookup, you can locate
other information associated with the host name or IP address, such as
associated mail services. nslookup is included with some UNIX-based
operating systems and in later Windows systems. In Windows XP, the
command can be entered on the "Command prompt" screen. A more
limited alternative to nslookup for looking up an IP address is
the ping command.
nslookup
Rubal_CN 24
arp
Rubal_CN 25
• Address Resolution Protocol (ARP) is a protocol for mapping
an Internet Protocol address (IP address) to a physical
machine address that is recognized in the local network.
• For example, in IP Version 4, the most common level of IP in
use today, an address is 32 bits long.
• In an Ethernet local area network, however, addresses for
attached devices are 48 bits long. (The physical machine
address is also known as a Media Access Control or MAC
address.)
• A table, usually called the ARP cache, is used to maintain a
correlation between each MAC address and its
corresponding IP address. ARP provides the protocol rules
for making this correlation and providing address conversion
in both directions.
arp
Rubal_CN 26
netstat
Rubal_CN 27
• Print network connections, routing tables, interface
statistics, masquerade connections, and multicast
memberships.
• Netstat is a common command
line TCP/IP networking utility available in most versions
of Windows, Linux, UNIX and other operating systems.
Netstat provides information and statistics
about protocols in use and current TCP/IP network
connections. (The name derives from the
words network and statistics.)
• Ref:
https://searchnetworking.techtarget.com/definition/ne
tstat
netstat
Rubal_CN 28
nbtstat
Rubal_CN 29
• Displays NetBIOS over TCP/IP (NetBT) protocol
statistics, NetBIOS name tables for both the local
computer and remote computers, and the NetBIOS
name cache.
• nbtstat allows a refresh of the NetBIOS name cache
and the names registered with Windows Internet
Name Service (WINS). Used without
parameters, nbtstat displays help.
• Ref: https://docs.microsoft.com/en-us/windows-
server/administration/windows-commands/nbtstat
nbtstat
Rubal_CN 30

Contenu connexe

Tendances

Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
Touhidul Fahim
 

Tendances (20)

Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 
IPv4 and IPv6
IPv4 and IPv6IPv4 and IPv6
IPv4 and IPv6
 
Network address translation
Network address translationNetwork address translation
Network address translation
 
Wi-Fi For Beginners - Module 3 - Access Points (APs)
Wi-Fi For Beginners - Module 3 - Access Points (APs)Wi-Fi For Beginners - Module 3 - Access Points (APs)
Wi-Fi For Beginners - Module 3 - Access Points (APs)
 
Presentation on router
Presentation on routerPresentation on router
Presentation on router
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 
Linux Networking Commands
Linux Networking CommandsLinux Networking Commands
Linux Networking Commands
 
Dhcp
DhcpDhcp
Dhcp
 
Network interface card(nic)
Network interface card(nic)Network interface card(nic)
Network interface card(nic)
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Network interface card
Network interface cardNetwork interface card
Network interface card
 
Ipv4 presentation
Ipv4 presentationIpv4 presentation
Ipv4 presentation
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
 
Subnetting made simple
Subnetting made simpleSubnetting made simple
Subnetting made simple
 

Similaire à Troubleshooting Network and Network Utilities

Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
GLIM Digital
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
Cengage Learning
 
Installation Of An Iso Image Dvd
Installation Of An Iso Image DvdInstallation Of An Iso Image Dvd
Installation Of An Iso Image Dvd
Susan Cox
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
eyebolloptics
 

Similaire à Troubleshooting Network and Network Utilities (20)

Commands.pptx
Commands.pptxCommands.pptx
Commands.pptx
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
 
MVA slides lesson 5
MVA slides lesson 5MVA slides lesson 5
MVA slides lesson 5
 
98 366 mva slides lesson 5
98 366 mva slides lesson 598 366 mva slides lesson 5
98 366 mva slides lesson 5
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
Network troubleshooting
Network troubleshootingNetwork troubleshooting
Network troubleshooting
 
Command.pptx presentation
Command.pptx presentationCommand.pptx presentation
Command.pptx presentation
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
 
Commands
CommandsCommands
Commands
 
networking.pptx
networking.pptxnetworking.pptx
networking.pptx
 
Introduction to Networking Commands & Software
Introduction to  Networking Commands & SoftwareIntroduction to  Networking Commands & Software
Introduction to Networking Commands & Software
 
Basic network training2
Basic network training2Basic network training2
Basic network training2
 
Installation Of An Iso Image Dvd
Installation Of An Iso Image DvdInstallation Of An Iso Image Dvd
Installation Of An Iso Image Dvd
 
NETWORKING COMMANDS.pptx
NETWORKING COMMANDS.pptxNETWORKING COMMANDS.pptx
NETWORKING COMMANDS.pptx
 
Linux network tools (Maarten Blomme)
Linux network tools (Maarten Blomme)Linux network tools (Maarten Blomme)
Linux network tools (Maarten Blomme)
 
Link i pv4
Link i pv4Link i pv4
Link i pv4
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
 
Learning series fundamentals of Networking and Medical Imaging
Learning series fundamentals of Networking and Medical ImagingLearning series fundamentals of Networking and Medical Imaging
Learning series fundamentals of Networking and Medical Imaging
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
 

Plus de Rubal Sagwal

Plus de Rubal Sagwal (20)

Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Cloud and Virtualization Security
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization Security
 
Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)
 
ER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMSER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMS
 
Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...
 
Overview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and ArchitectureOverview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and Architecture
 
Practical Implementation of Virtual Machine
Practical Implementation of Virtual MachinePractical Implementation of Virtual Machine
Practical Implementation of Virtual Machine
 
Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software
 
Accessing virtualized published applications
Accessing virtualized published applicationsAccessing virtualized published applications
Accessing virtualized published applications
 
Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization      Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization
 
Managing Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine ResourcesManaging Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine Resources
 
Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms
 
Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation
 
Principles of virtualization
Principles of virtualizationPrinciples of virtualization
Principles of virtualization
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
 
Basics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerBasics of Network Layer and Transport Layer
Basics of Network Layer and Transport Layer
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
 
Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP model
 

Dernier

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Dernier (20)

2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 

Troubleshooting Network and Network Utilities

  • 1. Computer Networks Unit - 8 Troubleshooting Network Date: Presented By: Rubal Sagwal Department of Computer Engineering 1Rubal_CN
  • 2. Contents • Network Troubleshooting • Network Utilities • Ipconfig • Ping • Tracert • Nslookup • Arp • Netstat • Nbtstat Rubal_CN 2
  • 3. Troubleshooting Network Network and Internet Troubleshooting Rubal_CN 3
  • 4. Troubleshooting Network • Network troubleshooting is the collective measures and processes used to identify, diagnose and resolve problems and issues within a computer network. • It is a systematic process that aims to resolve problems and restore normal network operations within the network. • Network troubleshooting is primarily done by network engineers or administrators to repair or optimize a network. It is generally done to recover and establish network or Internet connections on end nodes/devices. • Link: https://youtu.be/0-eefKkafhs Rubal_CN 4
  • 5. Troubleshooting Network Some of the processes within network troubleshooting include but are not limited to: • Finding and resolving problems and establishing Internet/network connection of a computer/device/node • Configuring a router, switch or any network management device • Installing cables or Wi-Fi devices • Updating firmware devices on router switch • Removing viruses • Adding, configuring and reinstalling a network printer Network troubleshooting can be a manual or automated task. When using automated tools, network management can be done using network diagnostic software. Rubal_CN 5
  • 6. Network Utilities Ipconfig – ping – tracert – nslookup – arp – netstat - nbtstat Rubal_CN 6
  • 7. Network Utilities • Network Utilities – provides a variety tools that can be used related to computer network information gathering and analysis. • Network Utility shows information about each of your network connections, including the Mac Address of the interface, the IP addresses assigned to it, its speed and status, a count of data packets sent and received, and a count of transmission errors and collisions. Rubal_CN 7
  • 8. Contd… Network Utilities Examples of what the Network Utility can help with: • Check your network connection • View network routing tables and statistics • Test whether you can contact another computer • Test your DNS server • Trace the paths of your network traffic • Check for open TCP ports Rubal_CN 8
  • 9. Ipconfig • Ipconfig (sometimes written as IPCONFIG) is a command line tool used to control the network connections on Windows NT/2000/XP machines. • Ipconfig displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. • Displays current info of your network • IP address of system • Ip add of router Rubal_CN 9
  • 10. Ipconfig The syntax for using ipconfig is: >ipconfig /parameter_name. For example, "ipconfig /all" displays the entire TCP/IP configuration of all available network adapters. Rubal_CN 10
  • 13. ping Rubal_CN 13 • Ping is a basic Internet program that allows a user to verify that a particular IP address exists and can accept requests. • Ping is used diagnostically to ensure that a host computer the user is trying to reach is actually operating. Ping works by sending an Internet Control Message Protocol (ICMP) Echo Request to a specified interface on the network and waiting for a reply. Ping can be used for troubleshooting to test connectivity and determine response time. • Allow you to send a signal to another device, if a device is active it will send you reply back. • It’s a subset of ICMP. • Echo request • Echo response
  • 14. ping Rubal_CN 14 • As a verb, ping means "to get the attention of" or "to check for the presence of" another party online. The computer acronym (for Packet Internet or Inter- Network Groper) was contrived to match the submariners' term for the sound of a returned sonar pulse. • Tip: To find out the dot address (such as 205.245.172.72) for a given domain name, Windows users can go to their command prompt screen (start/run/cmd) and enter ping xxxxx.yyy (where xxxxx is the second-level domain name like "whatis" and yyy is the top-level domain name like "com").
  • 16. Ping – with ip address – when active Rubal_CN 16
  • 17. Ping – with ip address – when device is not active Rubal_CN 17
  • 19. Tracert/ Traceroute Rubal_CN 19 • Trace the route to HOST • Tracert is a Windows based command-line tool that you can use to trace the path that an Internet Protocol (IP) packet takes to its destination from a source. • Tracert will determine the path taken to a destination. It does this by sending Internet Control Message Protocol (ICMP) Echo Request messages to the destination. • When sending traffic to the destination, it will incrementally increase the Time to Live (TTL) field values to aid in finding the path taken to that destination address. The path is outlined from this process. • Ref: https://www.mediacollege.com/internet/troubleshooter/tra ceroute.html
  • 22. nslookup Rubal_CN 22 • Query the nameserver for the IP address of the given HOST optionally using a specified DNS server. • nslookup is the name of a program that lets an Internet server administrator or any computer user enter a host name (for example, "whatis.com") and find out the corresponding IP address. It will also do reverse name lookup and find the host name for an IP address you specify.
  • 23. nslookup Rubal_CN 23 • For example, if you entered “www.whatis.com" (which is one of the TechTarget sites), you would receive as a response our IP address, which happens to be : 192.168.34.1 • Or if you entered "192.168.34.1", it would return "sites.techtarget.com". • nslookup sends a domain name query packet to a designated (or defaulted) domain name system (DNS) server. Depending on the system you are using, the default may be the local DNS name server at your service provider, some intermediate name server, or the root server system for the entire domain name system hierarchy. • Using the Linux and possibly other versions of nslookup, you can locate other information associated with the host name or IP address, such as associated mail services. nslookup is included with some UNIX-based operating systems and in later Windows systems. In Windows XP, the command can be entered on the "Command prompt" screen. A more limited alternative to nslookup for looking up an IP address is the ping command.
  • 25. arp Rubal_CN 25 • Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address that is recognized in the local network. • For example, in IP Version 4, the most common level of IP in use today, an address is 32 bits long. • In an Ethernet local area network, however, addresses for attached devices are 48 bits long. (The physical machine address is also known as a Media Access Control or MAC address.) • A table, usually called the ARP cache, is used to maintain a correlation between each MAC address and its corresponding IP address. ARP provides the protocol rules for making this correlation and providing address conversion in both directions.
  • 27. netstat Rubal_CN 27 • Print network connections, routing tables, interface statistics, masquerade connections, and multicast memberships. • Netstat is a common command line TCP/IP networking utility available in most versions of Windows, Linux, UNIX and other operating systems. Netstat provides information and statistics about protocols in use and current TCP/IP network connections. (The name derives from the words network and statistics.) • Ref: https://searchnetworking.techtarget.com/definition/ne tstat
  • 29. nbtstat Rubal_CN 29 • Displays NetBIOS over TCP/IP (NetBT) protocol statistics, NetBIOS name tables for both the local computer and remote computers, and the NetBIOS name cache. • nbtstat allows a refresh of the NetBIOS name cache and the names registered with Windows Internet Name Service (WINS). Used without parameters, nbtstat displays help. • Ref: https://docs.microsoft.com/en-us/windows- server/administration/windows-commands/nbtstat