SlideShare a Scribd company logo
1 of 30
Computer Networks
Unit - 8
Troubleshooting Network
Date:
Presented By:
Rubal Sagwal
Department of Computer Engineering
1Rubal_CN
Contents
• Network Troubleshooting
• Network Utilities
• Ipconfig
• Ping
• Tracert
• Nslookup
• Arp
• Netstat
• Nbtstat
Rubal_CN 2
Troubleshooting Network
Network and Internet Troubleshooting
Rubal_CN 3
Troubleshooting Network
• Network troubleshooting is the collective measures and
processes used to identify, diagnose and resolve
problems and issues within a computer network.
• It is a systematic process that aims to resolve problems
and restore normal network operations within the
network.
• Network troubleshooting is primarily done by network
engineers or administrators to repair or optimize a
network. It is generally done to recover and establish
network or Internet connections on end nodes/devices.
• Link: https://youtu.be/0-eefKkafhs
Rubal_CN 4
Troubleshooting Network
Some of the processes within network troubleshooting
include but are not limited to:
• Finding and resolving problems and establishing
Internet/network connection of a computer/device/node
• Configuring a router, switch or any network management
device
• Installing cables or Wi-Fi devices
• Updating firmware devices on router switch
• Removing viruses
• Adding, configuring and reinstalling a network printer
Network troubleshooting can be a manual or automated
task. When using automated tools, network
management can be done using network diagnostic
software.
Rubal_CN 5
Network Utilities
Ipconfig – ping – tracert – nslookup – arp – netstat - nbtstat
Rubal_CN 6
Network Utilities
• Network Utilities – provides a variety tools that can
be used related to computer network information
gathering and analysis.
• Network Utility shows information about each of
your network connections, including the Mac
Address of the interface, the IP addresses assigned
to it, its speed and status, a count of
data packets sent and received, and a count of
transmission errors and collisions.
Rubal_CN 7
Contd…
Network Utilities
Examples of what the Network Utility can help with:
• Check your network connection
• View network routing tables and statistics
• Test whether you can contact another computer
• Test your DNS server
• Trace the paths of your network traffic
• Check for open TCP ports
Rubal_CN 8
Ipconfig
• Ipconfig (sometimes written as IPCONFIG) is a
command line tool used to control the network
connections on Windows NT/2000/XP machines.
• Ipconfig displays all current TCP/IP network
configuration values and refreshes Dynamic Host
Configuration Protocol (DHCP) and Domain Name
System (DNS) settings.
• Displays current info of your network
• IP address of system
• Ip add of router
Rubal_CN 9
Ipconfig
The syntax for using ipconfig is:
>ipconfig /parameter_name.
For example, "ipconfig /all" displays the entire TCP/IP
configuration of all available network adapters.
Rubal_CN 10
ipconfig
Rubal_CN 11
ipconfig/all
Rubal_CN 12
ping
Rubal_CN 13
• Ping is a basic Internet program that allows a user to verify
that a particular IP address exists and can accept requests.
• Ping is used diagnostically to ensure that a host computer
the user is trying to reach is actually operating. Ping works
by sending an Internet Control Message Protocol (ICMP)
Echo Request to a specified interface on the network and
waiting for a reply. Ping can be used for troubleshooting to
test connectivity and determine response time.
• Allow you to send a signal to another device, if a device is
active it will send you reply back.
• It’s a subset of ICMP.
• Echo request
• Echo response
ping
Rubal_CN 14
• As a verb, ping means "to get the attention of" or "to
check for the presence of" another party online. The
computer acronym (for Packet Internet or Inter-
Network Groper) was contrived to match the
submariners' term for the sound of a returned sonar
pulse.
• Tip: To find out the dot address (such as
205.245.172.72) for a given domain name, Windows
users can go to their command prompt screen
(start/run/cmd) and enter ping xxxxx.yyy (where xxxxx
is the second-level domain name like "whatis" and yyy
is the top-level domain name like "com").
Ping – options
Rubal_CN 15
Ping – with ip address – when active
Rubal_CN 16
Ping – with ip address – when device is not
active
Rubal_CN 17
Ping – google
Rubal_CN 18
Tracert/ Traceroute
Rubal_CN 19
• Trace the route to HOST
• Tracert is a Windows based command-line tool that you can
use to trace the path that an Internet Protocol (IP) packet
takes to its destination from a source.
• Tracert will determine the path taken to a destination. It
does this by sending Internet Control Message Protocol
(ICMP) Echo Request messages to the destination.
• When sending traffic to the destination, it will incrementally
increase the Time to Live (TTL) field values to aid in finding
the path taken to that destination address. The path is
outlined from this process.
• Ref:
https://www.mediacollege.com/internet/troubleshooter/tra
ceroute.html
Tracert
Rubal_CN 20
Tracert - google
Rubal_CN 21
nslookup
Rubal_CN 22
• Query the nameserver for the IP address of the
given HOST optionally using a specified DNS
server.
• nslookup is the name of a program that lets an
Internet server administrator or any computer user
enter a host name (for example, "whatis.com") and
find out the corresponding IP address. It will also
do reverse name lookup and find the host name for
an IP address you specify.
nslookup
Rubal_CN 23
• For example, if you entered “www.whatis.com" (which is one of the
TechTarget sites), you would receive as a response our IP address, which
happens to be : 192.168.34.1
• Or if you entered "192.168.34.1", it would return "sites.techtarget.com".
• nslookup sends a domain name query packet to a designated (or
defaulted) domain name system (DNS) server. Depending on the system
you are using, the default may be the local DNS name server at your
service provider, some intermediate name server, or the root server
system for the entire domain name system hierarchy.
• Using the Linux and possibly other versions of nslookup, you can locate
other information associated with the host name or IP address, such as
associated mail services. nslookup is included with some UNIX-based
operating systems and in later Windows systems. In Windows XP, the
command can be entered on the "Command prompt" screen. A more
limited alternative to nslookup for looking up an IP address is
the ping command.
nslookup
Rubal_CN 24
arp
Rubal_CN 25
• Address Resolution Protocol (ARP) is a protocol for mapping
an Internet Protocol address (IP address) to a physical
machine address that is recognized in the local network.
• For example, in IP Version 4, the most common level of IP in
use today, an address is 32 bits long.
• In an Ethernet local area network, however, addresses for
attached devices are 48 bits long. (The physical machine
address is also known as a Media Access Control or MAC
address.)
• A table, usually called the ARP cache, is used to maintain a
correlation between each MAC address and its
corresponding IP address. ARP provides the protocol rules
for making this correlation and providing address conversion
in both directions.
arp
Rubal_CN 26
netstat
Rubal_CN 27
• Print network connections, routing tables, interface
statistics, masquerade connections, and multicast
memberships.
• Netstat is a common command
line TCP/IP networking utility available in most versions
of Windows, Linux, UNIX and other operating systems.
Netstat provides information and statistics
about protocols in use and current TCP/IP network
connections. (The name derives from the
words network and statistics.)
• Ref:
https://searchnetworking.techtarget.com/definition/ne
tstat
netstat
Rubal_CN 28
nbtstat
Rubal_CN 29
• Displays NetBIOS over TCP/IP (NetBT) protocol
statistics, NetBIOS name tables for both the local
computer and remote computers, and the NetBIOS
name cache.
• nbtstat allows a refresh of the NetBIOS name cache
and the names registered with Windows Internet
Name Service (WINS). Used without
parameters, nbtstat displays help.
• Ref: https://docs.microsoft.com/en-us/windows-
server/administration/windows-commands/nbtstat
nbtstat
Rubal_CN 30

More Related Content

What's hot

CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network Devices
Dsunte Wilson
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system ppt
ashutosh rai
 
IP Configuration
IP ConfigurationIP Configuration
IP Configuration
Stephen Raj
 

What's hot (20)

CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network Devices
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Network monitoring system
Network monitoring systemNetwork monitoring system
Network monitoring system
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
Access Control List (ACL)
Access Control List (ACL)Access Control List (ACL)
Access Control List (ACL)
 
Network design
Network designNetwork design
Network design
 
Packet Tracer Tutorial # 1
Packet Tracer Tutorial # 1Packet Tracer Tutorial # 1
Packet Tracer Tutorial # 1
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
CCNA presentation.
CCNA presentation.CCNA presentation.
CCNA presentation.
 
Ip address
Ip addressIp address
Ip address
 
Troubleshooting Your Network.pptx
Troubleshooting Your Network.pptxTroubleshooting Your Network.pptx
Troubleshooting Your Network.pptx
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocols
 
Introduction to router
Introduction to routerIntroduction to router
Introduction to router
 
Router configuration
Router configurationRouter configuration
Router configuration
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training Presentation
 
CCNA ppt
CCNA pptCCNA ppt
CCNA ppt
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system ppt
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
IP Configuration
IP ConfigurationIP Configuration
IP Configuration
 

Similar to Troubleshooting Network and Network Utilities

Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
GLIM Digital
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
Cengage Learning
 
Installation Of An Iso Image Dvd
Installation Of An Iso Image DvdInstallation Of An Iso Image Dvd
Installation Of An Iso Image Dvd
Susan Cox
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
eyebolloptics
 

Similar to Troubleshooting Network and Network Utilities (20)

Commands.pptx
Commands.pptxCommands.pptx
Commands.pptx
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
 
MVA slides lesson 5
MVA slides lesson 5MVA slides lesson 5
MVA slides lesson 5
 
98 366 mva slides lesson 5
98 366 mva slides lesson 598 366 mva slides lesson 5
98 366 mva slides lesson 5
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
Network troubleshooting
Network troubleshootingNetwork troubleshooting
Network troubleshooting
 
Command.pptx presentation
Command.pptx presentationCommand.pptx presentation
Command.pptx presentation
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
 
Commands
CommandsCommands
Commands
 
networking.pptx
networking.pptxnetworking.pptx
networking.pptx
 
Introduction to Networking Commands & Software
Introduction to  Networking Commands & SoftwareIntroduction to  Networking Commands & Software
Introduction to Networking Commands & Software
 
Basic network training2
Basic network training2Basic network training2
Basic network training2
 
Installation Of An Iso Image Dvd
Installation Of An Iso Image DvdInstallation Of An Iso Image Dvd
Installation Of An Iso Image Dvd
 
NETWORKING COMMANDS.pptx
NETWORKING COMMANDS.pptxNETWORKING COMMANDS.pptx
NETWORKING COMMANDS.pptx
 
Linux network tools (Maarten Blomme)
Linux network tools (Maarten Blomme)Linux network tools (Maarten Blomme)
Linux network tools (Maarten Blomme)
 
Link i pv4
Link i pv4Link i pv4
Link i pv4
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
 
Learning series fundamentals of Networking and Medical Imaging
Learning series fundamentals of Networking and Medical ImagingLearning series fundamentals of Networking and Medical Imaging
Learning series fundamentals of Networking and Medical Imaging
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
 

More from Rubal Sagwal

More from Rubal Sagwal (20)

Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Cloud and Virtualization Security
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization Security
 
Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)
 
ER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMSER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMS
 
Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...
 
Overview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and ArchitectureOverview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and Architecture
 
Practical Implementation of Virtual Machine
Practical Implementation of Virtual MachinePractical Implementation of Virtual Machine
Practical Implementation of Virtual Machine
 
Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software
 
Accessing virtualized published applications
Accessing virtualized published applicationsAccessing virtualized published applications
Accessing virtualized published applications
 
Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization      Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization
 
Managing Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine ResourcesManaging Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine Resources
 
Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms
 
Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation
 
Principles of virtualization
Principles of virtualizationPrinciples of virtualization
Principles of virtualization
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
 
Basics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerBasics of Network Layer and Transport Layer
Basics of Network Layer and Transport Layer
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
 
Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP model
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

Troubleshooting Network and Network Utilities

  • 1. Computer Networks Unit - 8 Troubleshooting Network Date: Presented By: Rubal Sagwal Department of Computer Engineering 1Rubal_CN
  • 2. Contents • Network Troubleshooting • Network Utilities • Ipconfig • Ping • Tracert • Nslookup • Arp • Netstat • Nbtstat Rubal_CN 2
  • 3. Troubleshooting Network Network and Internet Troubleshooting Rubal_CN 3
  • 4. Troubleshooting Network • Network troubleshooting is the collective measures and processes used to identify, diagnose and resolve problems and issues within a computer network. • It is a systematic process that aims to resolve problems and restore normal network operations within the network. • Network troubleshooting is primarily done by network engineers or administrators to repair or optimize a network. It is generally done to recover and establish network or Internet connections on end nodes/devices. • Link: https://youtu.be/0-eefKkafhs Rubal_CN 4
  • 5. Troubleshooting Network Some of the processes within network troubleshooting include but are not limited to: • Finding and resolving problems and establishing Internet/network connection of a computer/device/node • Configuring a router, switch or any network management device • Installing cables or Wi-Fi devices • Updating firmware devices on router switch • Removing viruses • Adding, configuring and reinstalling a network printer Network troubleshooting can be a manual or automated task. When using automated tools, network management can be done using network diagnostic software. Rubal_CN 5
  • 6. Network Utilities Ipconfig – ping – tracert – nslookup – arp – netstat - nbtstat Rubal_CN 6
  • 7. Network Utilities • Network Utilities – provides a variety tools that can be used related to computer network information gathering and analysis. • Network Utility shows information about each of your network connections, including the Mac Address of the interface, the IP addresses assigned to it, its speed and status, a count of data packets sent and received, and a count of transmission errors and collisions. Rubal_CN 7
  • 8. Contd… Network Utilities Examples of what the Network Utility can help with: • Check your network connection • View network routing tables and statistics • Test whether you can contact another computer • Test your DNS server • Trace the paths of your network traffic • Check for open TCP ports Rubal_CN 8
  • 9. Ipconfig • Ipconfig (sometimes written as IPCONFIG) is a command line tool used to control the network connections on Windows NT/2000/XP machines. • Ipconfig displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. • Displays current info of your network • IP address of system • Ip add of router Rubal_CN 9
  • 10. Ipconfig The syntax for using ipconfig is: >ipconfig /parameter_name. For example, "ipconfig /all" displays the entire TCP/IP configuration of all available network adapters. Rubal_CN 10
  • 13. ping Rubal_CN 13 • Ping is a basic Internet program that allows a user to verify that a particular IP address exists and can accept requests. • Ping is used diagnostically to ensure that a host computer the user is trying to reach is actually operating. Ping works by sending an Internet Control Message Protocol (ICMP) Echo Request to a specified interface on the network and waiting for a reply. Ping can be used for troubleshooting to test connectivity and determine response time. • Allow you to send a signal to another device, if a device is active it will send you reply back. • It’s a subset of ICMP. • Echo request • Echo response
  • 14. ping Rubal_CN 14 • As a verb, ping means "to get the attention of" or "to check for the presence of" another party online. The computer acronym (for Packet Internet or Inter- Network Groper) was contrived to match the submariners' term for the sound of a returned sonar pulse. • Tip: To find out the dot address (such as 205.245.172.72) for a given domain name, Windows users can go to their command prompt screen (start/run/cmd) and enter ping xxxxx.yyy (where xxxxx is the second-level domain name like "whatis" and yyy is the top-level domain name like "com").
  • 16. Ping – with ip address – when active Rubal_CN 16
  • 17. Ping – with ip address – when device is not active Rubal_CN 17
  • 19. Tracert/ Traceroute Rubal_CN 19 • Trace the route to HOST • Tracert is a Windows based command-line tool that you can use to trace the path that an Internet Protocol (IP) packet takes to its destination from a source. • Tracert will determine the path taken to a destination. It does this by sending Internet Control Message Protocol (ICMP) Echo Request messages to the destination. • When sending traffic to the destination, it will incrementally increase the Time to Live (TTL) field values to aid in finding the path taken to that destination address. The path is outlined from this process. • Ref: https://www.mediacollege.com/internet/troubleshooter/tra ceroute.html
  • 22. nslookup Rubal_CN 22 • Query the nameserver for the IP address of the given HOST optionally using a specified DNS server. • nslookup is the name of a program that lets an Internet server administrator or any computer user enter a host name (for example, "whatis.com") and find out the corresponding IP address. It will also do reverse name lookup and find the host name for an IP address you specify.
  • 23. nslookup Rubal_CN 23 • For example, if you entered “www.whatis.com" (which is one of the TechTarget sites), you would receive as a response our IP address, which happens to be : 192.168.34.1 • Or if you entered "192.168.34.1", it would return "sites.techtarget.com". • nslookup sends a domain name query packet to a designated (or defaulted) domain name system (DNS) server. Depending on the system you are using, the default may be the local DNS name server at your service provider, some intermediate name server, or the root server system for the entire domain name system hierarchy. • Using the Linux and possibly other versions of nslookup, you can locate other information associated with the host name or IP address, such as associated mail services. nslookup is included with some UNIX-based operating systems and in later Windows systems. In Windows XP, the command can be entered on the "Command prompt" screen. A more limited alternative to nslookup for looking up an IP address is the ping command.
  • 25. arp Rubal_CN 25 • Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address that is recognized in the local network. • For example, in IP Version 4, the most common level of IP in use today, an address is 32 bits long. • In an Ethernet local area network, however, addresses for attached devices are 48 bits long. (The physical machine address is also known as a Media Access Control or MAC address.) • A table, usually called the ARP cache, is used to maintain a correlation between each MAC address and its corresponding IP address. ARP provides the protocol rules for making this correlation and providing address conversion in both directions.
  • 27. netstat Rubal_CN 27 • Print network connections, routing tables, interface statistics, masquerade connections, and multicast memberships. • Netstat is a common command line TCP/IP networking utility available in most versions of Windows, Linux, UNIX and other operating systems. Netstat provides information and statistics about protocols in use and current TCP/IP network connections. (The name derives from the words network and statistics.) • Ref: https://searchnetworking.techtarget.com/definition/ne tstat
  • 29. nbtstat Rubal_CN 29 • Displays NetBIOS over TCP/IP (NetBT) protocol statistics, NetBIOS name tables for both the local computer and remote computers, and the NetBIOS name cache. • nbtstat allows a refresh of the NetBIOS name cache and the names registered with Windows Internet Name Service (WINS). Used without parameters, nbtstat displays help. • Ref: https://docs.microsoft.com/en-us/windows- server/administration/windows-commands/nbtstat