This document provides an overview of networking software and commands used in Windows 10. It discusses setting the IP configuration, including obtaining IP addresses dynamically from a DHCP server or manually configuring a static IP. Common networking commands and software introduced include ipconfig for viewing IP settings, ping for testing network connectivity, and Wireshark for network packet capture and analysis. The document emphasizes that networking software helps users explore, configure, troubleshoot and manage networks, while remaining transparent to end users of network services.
The document discusses various Linux network configuration and troubleshooting commands, including ifconfig for configuring network interfaces and viewing network settings, ping for testing network connectivity, traceroute for tracing the network route to a destination, and commands like netstat, dig, nslookup, route, host, arp, ethtool, iwconfig, and hostname for additional network tasks and information retrieval. It provides examples and brief explanations of how to use each command.
This document provides a cheat sheet of commands for configuring Cisco switches using both IOS and CLI switches. It lists commands for setting the hostname and system name, passwords, remote access, CDP configuration, port descriptions, port speeds, duplex settings, static VLAN configuration, trunk line configuration, VTP configuration, port channel configuration, STP settings, enabling Port Fast and UplinkFast, and recovering router passwords. It also provides contact information for a Cisco networking equipment wholesaler.
A network switch connects devices on a computer network by receiving and forwarding data packets to their destination. It provides connection points for end users into the enterprise network and controls information flow within the local area network (LAN) using MAC addresses. There are two main types of switches: modular switches which provide flexibility through expansion modules, and fixed-configuration switches which include unmanaged, managed, and smart switches of varying capabilities and costs. A switch works at the data link layer to inspect packet headers, maintain a MAC address table mapping devices to ports, and forward packets only to the proper destination port to minimize traffic.
Network Design on cisco packet tracer 6.0Saurav Pandey
This document proposes a network design using access controls and VoIP. It includes configuration of routers, switches, VLANs, DHCP, RIP routing protocol, frame relay, telnet, ACLs and VoIP protocols like Call Manager Express. The network connects three locations - a head office and two branch offices - using routers, switches, frame relay, VLANs and access controls to filter unauthorized traffic and allow only genuine users. VoIP is implemented using protocols like DHCP, Call Manager Express, phone directory and dial peer configuration to enable voice calls between the locations over the IP network.
This document discusses various networking devices used to connect electronic devices and share resources in a computer network. It describes network interface cards (NICs) that provide the physical interface between a computer and cabling. It also covers repeaters that regenerate signals to extend distances, modems that modulate and demodulate signals for internet connections, hubs and switches that connect multiple devices either by broadcasting or selectively forwarding, bridges that segment networks while filtering traffic, and routers that intelligently connect different network types and choose optimal paths between them. The document provides details on the function and layer (physical, data link, network) of operation for each type of networking device.
This document discusses Cisco Certified Network Associate (CCNA) certification and networking concepts. It includes:
- An overview of the CCNA certification and what skills it demonstrates in networking areas like LANs, WANs, routing protocols, and network access.
- Explanations of common networking devices, topologies, protocols like IP addressing and routing, and models like the OSI model.
- Descriptions of static and dynamic routing, protocols like RIP, OSPF, EIGRP, and commands used to configure routers.
Routing is the process of selecting a path for traffic in a network or between or across multiple networks. this slide helps to describe routing protocols and their various aspects.
An IP address is a unique 32-bit number that identifies each device on a network. It allows devices to communicate by sending and receiving data packets. IP addresses are made up of a network portion and host portion, with four sections that each range from 0-255. There are five classes of IP addresses - A, B, C, D and E - that determine the number of networks and hosts. IPv4 uses 32-bit addresses written in dotted decimal notation, while IPv6 uses 128-bit addresses written in hex. IP addresses can be static or dynamically assigned by a DHCP server.
The document discusses various Linux network configuration and troubleshooting commands, including ifconfig for configuring network interfaces and viewing network settings, ping for testing network connectivity, traceroute for tracing the network route to a destination, and commands like netstat, dig, nslookup, route, host, arp, ethtool, iwconfig, and hostname for additional network tasks and information retrieval. It provides examples and brief explanations of how to use each command.
This document provides a cheat sheet of commands for configuring Cisco switches using both IOS and CLI switches. It lists commands for setting the hostname and system name, passwords, remote access, CDP configuration, port descriptions, port speeds, duplex settings, static VLAN configuration, trunk line configuration, VTP configuration, port channel configuration, STP settings, enabling Port Fast and UplinkFast, and recovering router passwords. It also provides contact information for a Cisco networking equipment wholesaler.
A network switch connects devices on a computer network by receiving and forwarding data packets to their destination. It provides connection points for end users into the enterprise network and controls information flow within the local area network (LAN) using MAC addresses. There are two main types of switches: modular switches which provide flexibility through expansion modules, and fixed-configuration switches which include unmanaged, managed, and smart switches of varying capabilities and costs. A switch works at the data link layer to inspect packet headers, maintain a MAC address table mapping devices to ports, and forward packets only to the proper destination port to minimize traffic.
Network Design on cisco packet tracer 6.0Saurav Pandey
This document proposes a network design using access controls and VoIP. It includes configuration of routers, switches, VLANs, DHCP, RIP routing protocol, frame relay, telnet, ACLs and VoIP protocols like Call Manager Express. The network connects three locations - a head office and two branch offices - using routers, switches, frame relay, VLANs and access controls to filter unauthorized traffic and allow only genuine users. VoIP is implemented using protocols like DHCP, Call Manager Express, phone directory and dial peer configuration to enable voice calls between the locations over the IP network.
This document discusses various networking devices used to connect electronic devices and share resources in a computer network. It describes network interface cards (NICs) that provide the physical interface between a computer and cabling. It also covers repeaters that regenerate signals to extend distances, modems that modulate and demodulate signals for internet connections, hubs and switches that connect multiple devices either by broadcasting or selectively forwarding, bridges that segment networks while filtering traffic, and routers that intelligently connect different network types and choose optimal paths between them. The document provides details on the function and layer (physical, data link, network) of operation for each type of networking device.
This document discusses Cisco Certified Network Associate (CCNA) certification and networking concepts. It includes:
- An overview of the CCNA certification and what skills it demonstrates in networking areas like LANs, WANs, routing protocols, and network access.
- Explanations of common networking devices, topologies, protocols like IP addressing and routing, and models like the OSI model.
- Descriptions of static and dynamic routing, protocols like RIP, OSPF, EIGRP, and commands used to configure routers.
Routing is the process of selecting a path for traffic in a network or between or across multiple networks. this slide helps to describe routing protocols and their various aspects.
An IP address is a unique 32-bit number that identifies each device on a network. It allows devices to communicate by sending and receiving data packets. IP addresses are made up of a network portion and host portion, with four sections that each range from 0-255. There are five classes of IP addresses - A, B, C, D and E - that determine the number of networks and hosts. IPv4 uses 32-bit addresses written in dotted decimal notation, while IPv6 uses 128-bit addresses written in hex. IP addresses can be static or dynamically assigned by a DHCP server.
This document provides information about Cisco and the CCNA certification. It discusses Cisco as a company and their networking products. The CCNA certification focuses on routing, switching, security, service provider, and voice communication skills. The CCNA exam contains questions in drag and drop and simulation formats. The document also summarizes different types of computer networks, common networking devices, cable types, topologies and more.
IP addressing and subnetting allows networks to be logically organized and divided. The key objectives covered include explaining IP address classes, configuring addresses, subnetting networks, and advanced concepts like CIDR, summarization, and VLSM. Transitioning to IPv6 is also discussed as a way to address the depletion of IPv4 addresses and improve security.
Introduction to Network Devices & Addressing SchemesMuhammadRizaHilmi
This document provides an introduction to network devices, addressing schemes, and the basic elements of a network. It discusses:
- The basic function of a network is to enable communication between end users such as servers, clients, mobile devices, and PCs.
- All networks have four basic elements - hardware devices and medium, and software messages and rules/agreements. It describes examples of each element.
- It differentiates between end devices that users directly interact with, and networking devices that help facilitate communication between end devices. Common examples of each type of device are given.
- There are three important addressing schemes that help identify locations and applications in a network - IP addresses identify individual devices, port numbers
This document discusses VLANs (virtual local area networks). VLANs logically separate network users and resources connected to switch ports, creating smaller broadcast domains. VLANs simplify network management, provide security over flat networks, and allow flexibility and scalability. VLANs reduce broadcast traffic by containing it within virtual broadcast domains. They allow users to be added to VLANs regardless of physical location and enable adding new VLANs as network growth requires more bandwidth. The document also covers VLAN trunking, identification, membership configuration, and VTP (VLAN Trunking Protocol) which centrally manages VLAN configurations across switches to maintain consistency.
This document provides an overview of data communications and computer networks. It discusses the basic elements of a communication system including senders, receivers, and transmission media. It then describes different types of transmission media such as twisted pair wire, coaxial cable, microwave systems, and optical fibers. The document also covers digital and analog data transmission, network topologies including star, ring, bus and hybrid networks. It defines local and wide area networks and describes some common networking devices like network interface cards.
The document provides guidance on troubleshooting network issues. It discusses maintaining documentation of problems, using utilities to detect physical and connectivity issues, and following a troubleshooting process. The process involves gathering information from the user and equipment. It then details various commands and tools to verify TCP/IP connectivity and test different network components. Specific issues that could occur with wired, wireless, and client connections are explored.
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
This document provides an overview of basic switching concepts and Cisco switch configuration. It explains Ethernet and how switches work to segment networks and reduce collisions. Switches operate at the data link layer and learn MAC addresses to forward frames efficiently. The document discusses switch configuration using commands like hostname, interface, duplex, and port security. It compares switching methods like store-and-forward and cut-through forwarding. The summary reiterates how switches divide collision domains to improve performance over shared-medium Ethernet.
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)Kruti Niranjan
This document provides information about the Transport Layer protocols TCP and UDP. It describes:
1) TCP is a connection-oriented protocol that provides reliable, in-order delivery of data through features like flow control, error control, and congestion control. UDP is a connectionless protocol that does not guarantee delivery or order of packets.
2) The TCP header contains fields for source/destination ports, sequence numbers, acknowledgement numbers, flags, window size, checksum, and options. The UDP header contains fields for source/destination ports, length, and checksum.
3) The main differences between TCP and UDP are that TCP is connection-oriented, provides error control and flow control, and supports full duplex communication
Subnets divide a network into smaller sub-networks or subnets. Each subnet is treated as a separate network and can be further divided. When a packet enters a network with subnets, routers will route based on the subnet ID which is a combination of the network ID and subnet portion of the IP address. Subnets are only relevant for routing within an organization and are transparent outside the organization.
There are many standards organizations that establish networking standards. The key organizations discussed are IEEE, which establishes electrical and computer engineering standards; ISO, which sets international technological standards; ANSI, which represents the US in international standards setting; and organizations like IETF, IANA, and ICANN that set Internet protocols and manage IP addressing.
These slides cover a topic on ISDN (Integrated Services Digital Network) in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
This document discusses multicasting and multicast routing protocols. It defines unicast, multicast, and broadcast messages and describes applications of multicasting like accessing distributed databases and distance learning. It also explains different multicast routing protocols including MOSPF, DVMRP, CBT, and PIM, covering concepts like shortest path trees, flooding, pruning, and grafting. Finally, it discusses MBONE and how tunneling can be used to connect isolated multicast routers.
The document provides information about CCNA training and certification. It discusses the topics covered in the CCNA exam, recommended training courses, study materials, exam format and structure. The CCNA certification tests knowledge of network fundamentals, switching, routing, WAN technologies, security and management. Exams last 90 minutes and contain around 50-60 multiple choice and simulation questions. Common jobs requiring the CCNA include network administrator, database administrator and help desk technician.
This document discusses different types of computer networks. It describes local area networks (LANs) which connect devices within a building or home, metropolitan area networks (MANs) that span a larger area like a city, and wide area networks (WANs) that connect LANs over long distances, sometimes worldwide. It also discusses personal area networks (PANs) used to connect devices in close proximity, within a few meters of an individual. LANs can use either wired or wireless connections and common standards help ensure compatibility. While networks provide benefits like resource sharing, there are also costs to installing and maintaining them.
This document provides an overview of network protocols and communication. It discusses how rules and protocols govern communication and facilitate the exchange of information across networks. Standards organizations help establish common protocols to ensure interoperability. The document also examines how data is encapsulated and transferred across network layers using protocols like TCP/IP. Local devices access resources by using network and data link layer addresses.
The document discusses the TCP/IP protocol stack and the headers used at each layer.
It describes that TCP works to divide files into packets and send them to workstations, while IP handles routing packets through networks. The TCP header includes fields like source/destination port numbers, sequence numbers, flags, and checksums. The IP header treats the TCP header+data as a datagram and adds its own header fields like version, length, identification, flags, time to live, and source/destination addresses.
An Authentication Header can also be added for security purposes to authenticate senders and protect against modification of packets.
This document provides an overview of Cisco systems and basic router configuration. It defines Cisco as a networking company and discusses the basic components and functions of a router, including how routers use routing tables to determine the best path for forwarding packets. It also introduces Packet Tracer, a network simulation program, and covers topics like configuring router interfaces, static routes, and dynamic routing protocols.
The document discusses the Internet Protocol (IP) which is the cornerstone of the TCP/IP architecture and allows all computers on the Internet to communicate. There are two main versions of IP - IPv4, the currently used version, and IPv6 which is intended to replace IPv4 and includes improvements like longer addresses. IP addresses are 32-bit for IPv4 and 128-bit for IPv6. Strategies like private addressing and Classless Inter-Domain Routing (CIDR) help conserve the limited number of available IP addresses.
This document discusses different methods for allowing one-to-one communication between nodes in large networks, including direct connections, central controllers, and common buses. It focuses on switching networks, which consist of interlinked switches that can create temporary connections between devices. There are three main types of switching networks: circuit switching, packet switching, and message switching. Packet switching breaks messages into small packets that contain user data and control information and are briefly stored at nodes before being passed to the next node.
The document provides an introduction to networking commands and software in Windows XP. It discusses how to configure the TCP/IP settings such as IP address, subnet mask, default gateway and DNS server. Common networking commands like ipconfig, ping, tracert and nslookup are explained. Ipconfig is used to view IP configuration, ping tests connectivity, tracert traces the route to a destination, and nslookup looks up domain names to IP addresses. Networking software like Net Tools and Free IP Tools that provide GUI interfaces for commands are also introduced.
The document discusses various topics related to system administration including system administrator responsibilities, file systems like NTFS and FAT, networking concepts like VOIP and proxy servers, Windows servers, DHCP, DNS, Active Directory and Group Policy. It provides definitions and explanations of these topics through questions and answers.
This document provides information about Cisco and the CCNA certification. It discusses Cisco as a company and their networking products. The CCNA certification focuses on routing, switching, security, service provider, and voice communication skills. The CCNA exam contains questions in drag and drop and simulation formats. The document also summarizes different types of computer networks, common networking devices, cable types, topologies and more.
IP addressing and subnetting allows networks to be logically organized and divided. The key objectives covered include explaining IP address classes, configuring addresses, subnetting networks, and advanced concepts like CIDR, summarization, and VLSM. Transitioning to IPv6 is also discussed as a way to address the depletion of IPv4 addresses and improve security.
Introduction to Network Devices & Addressing SchemesMuhammadRizaHilmi
This document provides an introduction to network devices, addressing schemes, and the basic elements of a network. It discusses:
- The basic function of a network is to enable communication between end users such as servers, clients, mobile devices, and PCs.
- All networks have four basic elements - hardware devices and medium, and software messages and rules/agreements. It describes examples of each element.
- It differentiates between end devices that users directly interact with, and networking devices that help facilitate communication between end devices. Common examples of each type of device are given.
- There are three important addressing schemes that help identify locations and applications in a network - IP addresses identify individual devices, port numbers
This document discusses VLANs (virtual local area networks). VLANs logically separate network users and resources connected to switch ports, creating smaller broadcast domains. VLANs simplify network management, provide security over flat networks, and allow flexibility and scalability. VLANs reduce broadcast traffic by containing it within virtual broadcast domains. They allow users to be added to VLANs regardless of physical location and enable adding new VLANs as network growth requires more bandwidth. The document also covers VLAN trunking, identification, membership configuration, and VTP (VLAN Trunking Protocol) which centrally manages VLAN configurations across switches to maintain consistency.
This document provides an overview of data communications and computer networks. It discusses the basic elements of a communication system including senders, receivers, and transmission media. It then describes different types of transmission media such as twisted pair wire, coaxial cable, microwave systems, and optical fibers. The document also covers digital and analog data transmission, network topologies including star, ring, bus and hybrid networks. It defines local and wide area networks and describes some common networking devices like network interface cards.
The document provides guidance on troubleshooting network issues. It discusses maintaining documentation of problems, using utilities to detect physical and connectivity issues, and following a troubleshooting process. The process involves gathering information from the user and equipment. It then details various commands and tools to verify TCP/IP connectivity and test different network components. Specific issues that could occur with wired, wireless, and client connections are explored.
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
This document provides an overview of basic switching concepts and Cisco switch configuration. It explains Ethernet and how switches work to segment networks and reduce collisions. Switches operate at the data link layer and learn MAC addresses to forward frames efficiently. The document discusses switch configuration using commands like hostname, interface, duplex, and port security. It compares switching methods like store-and-forward and cut-through forwarding. The summary reiterates how switches divide collision domains to improve performance over shared-medium Ethernet.
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)Kruti Niranjan
This document provides information about the Transport Layer protocols TCP and UDP. It describes:
1) TCP is a connection-oriented protocol that provides reliable, in-order delivery of data through features like flow control, error control, and congestion control. UDP is a connectionless protocol that does not guarantee delivery or order of packets.
2) The TCP header contains fields for source/destination ports, sequence numbers, acknowledgement numbers, flags, window size, checksum, and options. The UDP header contains fields for source/destination ports, length, and checksum.
3) The main differences between TCP and UDP are that TCP is connection-oriented, provides error control and flow control, and supports full duplex communication
Subnets divide a network into smaller sub-networks or subnets. Each subnet is treated as a separate network and can be further divided. When a packet enters a network with subnets, routers will route based on the subnet ID which is a combination of the network ID and subnet portion of the IP address. Subnets are only relevant for routing within an organization and are transparent outside the organization.
There are many standards organizations that establish networking standards. The key organizations discussed are IEEE, which establishes electrical and computer engineering standards; ISO, which sets international technological standards; ANSI, which represents the US in international standards setting; and organizations like IETF, IANA, and ICANN that set Internet protocols and manage IP addressing.
These slides cover a topic on ISDN (Integrated Services Digital Network) in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
This document discusses multicasting and multicast routing protocols. It defines unicast, multicast, and broadcast messages and describes applications of multicasting like accessing distributed databases and distance learning. It also explains different multicast routing protocols including MOSPF, DVMRP, CBT, and PIM, covering concepts like shortest path trees, flooding, pruning, and grafting. Finally, it discusses MBONE and how tunneling can be used to connect isolated multicast routers.
The document provides information about CCNA training and certification. It discusses the topics covered in the CCNA exam, recommended training courses, study materials, exam format and structure. The CCNA certification tests knowledge of network fundamentals, switching, routing, WAN technologies, security and management. Exams last 90 minutes and contain around 50-60 multiple choice and simulation questions. Common jobs requiring the CCNA include network administrator, database administrator and help desk technician.
This document discusses different types of computer networks. It describes local area networks (LANs) which connect devices within a building or home, metropolitan area networks (MANs) that span a larger area like a city, and wide area networks (WANs) that connect LANs over long distances, sometimes worldwide. It also discusses personal area networks (PANs) used to connect devices in close proximity, within a few meters of an individual. LANs can use either wired or wireless connections and common standards help ensure compatibility. While networks provide benefits like resource sharing, there are also costs to installing and maintaining them.
This document provides an overview of network protocols and communication. It discusses how rules and protocols govern communication and facilitate the exchange of information across networks. Standards organizations help establish common protocols to ensure interoperability. The document also examines how data is encapsulated and transferred across network layers using protocols like TCP/IP. Local devices access resources by using network and data link layer addresses.
The document discusses the TCP/IP protocol stack and the headers used at each layer.
It describes that TCP works to divide files into packets and send them to workstations, while IP handles routing packets through networks. The TCP header includes fields like source/destination port numbers, sequence numbers, flags, and checksums. The IP header treats the TCP header+data as a datagram and adds its own header fields like version, length, identification, flags, time to live, and source/destination addresses.
An Authentication Header can also be added for security purposes to authenticate senders and protect against modification of packets.
This document provides an overview of Cisco systems and basic router configuration. It defines Cisco as a networking company and discusses the basic components and functions of a router, including how routers use routing tables to determine the best path for forwarding packets. It also introduces Packet Tracer, a network simulation program, and covers topics like configuring router interfaces, static routes, and dynamic routing protocols.
The document discusses the Internet Protocol (IP) which is the cornerstone of the TCP/IP architecture and allows all computers on the Internet to communicate. There are two main versions of IP - IPv4, the currently used version, and IPv6 which is intended to replace IPv4 and includes improvements like longer addresses. IP addresses are 32-bit for IPv4 and 128-bit for IPv6. Strategies like private addressing and Classless Inter-Domain Routing (CIDR) help conserve the limited number of available IP addresses.
This document discusses different methods for allowing one-to-one communication between nodes in large networks, including direct connections, central controllers, and common buses. It focuses on switching networks, which consist of interlinked switches that can create temporary connections between devices. There are three main types of switching networks: circuit switching, packet switching, and message switching. Packet switching breaks messages into small packets that contain user data and control information and are briefly stored at nodes before being passed to the next node.
The document provides an introduction to networking commands and software in Windows XP. It discusses how to configure the TCP/IP settings such as IP address, subnet mask, default gateway and DNS server. Common networking commands like ipconfig, ping, tracert and nslookup are explained. Ipconfig is used to view IP configuration, ping tests connectivity, tracert traces the route to a destination, and nslookup looks up domain names to IP addresses. Networking software like Net Tools and Free IP Tools that provide GUI interfaces for commands are also introduced.
The document discusses various topics related to system administration including system administrator responsibilities, file systems like NTFS and FAT, networking concepts like VOIP and proxy servers, Windows servers, DHCP, DNS, Active Directory and Group Policy. It provides definitions and explanations of these topics through questions and answers.
The document discusses network assessment and administration. It describes how network messages are broadcast, defining broadcast messages as messages addressed to every host on a network. It also discusses system administration, describing it as where humans interface with computers to solve problems or provide services. The document outlines various components of a computer network, such as humans, hosts, routers, switches, and cables. It provides steps for network analysis, including reviewing physical network topology, DNS data, operating systems, configurations, devices, subnets, routers, IP addresses, and services used on the network.
IP addresses identify devices on the network and have a standard dotted decimal format. MAC addresses uniquely identify a device's network interface and are burned into the hardware. Port numbers further specify applications/services within devices, with well-known ports below 1024.
This document provides instructions for configuring a network client. It describes installing the network interface card driver, accessing the network connections window, selecting protocols like NetBEUI or TCP/IP, and configuring services and components. It also discusses identifying the client by giving it a computer name and selecting a workgroup or domain. The key steps are installing the NIC driver, selecting a single network protocol, enabling necessary services, and identifying the client with a name and network affiliation.
This document discusses using connectivity utilities to troubleshoot common network problems. It describes four types of connectivity problems: protocol problems, line problems, name resolution problems, and network performance problems. It then explains key connectivity utilities like Ping, IPConfig, Ifconfig and ARP that can be used to diagnose these issues. Specific sequences of commands with these utilities are provided to methodically test network connectivity and troubleshoot problems.
The document provides an introduction to computer networks and the internet. It discusses key topics such as:
- What the internet is and how it allows global communication and information sharing through interconnected networks using protocols like IP.
- Popular internet applications include the world wide web, email, file transfer, and streaming.
- The differences between "internet" and "Internet" and what is needed to visit websites, including having a machine with TCP/IP, a gateway, DNS server, browser, and URL or IP address.
- Other topics covered include IP addresses, domains, URLs, internet browsers, creating basic web pages, and protecting computers from viruses and spyware.
This document provides an overview of network troubleshooting techniques and tools. It discusses focusing on understanding basics and standard troubleshooting tools like ping first before trying more advanced methods. Documentation of network configurations, changes, and issues is emphasized. A variety of Linux command line tools are also introduced for examining network connectivity and performance issues like netstat, ifconfig, route, traceroute, and packet capture tools.
AD, DNS, DHCP, HTTP, HTTPS, SMTP, POP3 and FTP use specific port numbers. The FTP server accepts incoming FTP requests and copies files to a publishing folder for access over the network. Virtual hosting refers to multiple websites hosted on one server, with each site virtually shared and not dedicated. Cloud computing infrastructure differs from traditional client-server models by using a main cloud controller and worker nodes/clusters to process requests from clients.
The document provides instructions for setting up a Linksys wireless router and adapter. It describes:
1. Connecting a USB network adapter to a computer and allowing Windows to install drivers automatically or using the Linksys disk.
2. Identifying the components of the Linksys AP router, including ports on the back panel and LEDs on the front panel.
3. Configuring wired and wireless connections between the router and PCs, including connecting cables and setting the SSID.
What is Subnet mask
By setting the host bits to all 0s and the network bits to all 1, a 32-bit integer known as a subnet mask is produced. The subnet mask divides the IP address into the network address and host address in this manner. A broadcast address is always associated with the "255" address, while a network address is always associated with the "0" address.
A subnet, or subnetwork, is a network inside a network. Subnets make networks more efficient. Through subnetting, network traffic can travel a shorter distance without passing through unnecessary routers to reach its destination.
DHCP stands for dynamic host configuration protocol. What it does is dynamically assign network settings from a server. In other words, instead of having to configure the parameters related to how your computer communicates with a network, it happens automatically.
Assigning an IP address dynamically is the most basic piece but there is a lot more to DHCP. This includes the netmask, host name, domain name, gateway and name servers. In addition, DHCP can supply other information such as a time server.
Many people are anti-DHCP, because they see it as a way that an ISP offers you an IP address that changes. This, of course, makes it difficult to advertise a server. On the other hand, DHCP can save you a lot of ongoing configuration work within your company or organization.
Automation has changed network management by enabling new devices to automatically find initial configurations, utilizing scripts to standardize procedures, and scheduling operations, reducing the need for manual "box-by-box" configurations. Software-defined networking (SDN) further automates networks by using controllers to handle tasks like configuration deployment and software upgrades across devices, allowing operators to focus on higher-level design work. SDN implementations can take an imperative approach where the controller fully programs device forwarding, or a declarative approach where the controller declares requirements and devices determine how to implement them.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
DHCP automates the assigning and tracking of IP addresses to simplify network configuration. It dynamically allocates addresses from a pool and reclaims them when no longer needed to avoid duplicates. DHCP options provide additional configuration parameters and reservations assign static addresses. Proper administration includes authorizing servers, defining scopes, and backing up the DHCP database.
This document provides information about registering devices on the Boston University network (ResNet) and ensuring device security. It discusses NetReg, the process for registering devices, and BUVS, the security tool formerly required before registration. The document outlines the NetReg registration steps and provides troubleshooting tips for common network and device issues like physical problems, configuration problems, and malware. It describes testing devices, cables, and ports using known good components to isolate issues.
The document discusses networking concepts such as the difference between the internet and a network, internetworking, internet protocols, internet architecture, TCP/IP models, address mapping protocols, dynamic host configuration protocol, and domain name system servers. It provides definitions and explanations of these topics, describing for example that the internet is a global network of interconnected computer networks that uses common protocols like TCP/IP to connect devices, while a network is a set of devices connected locally.
1) A router connects two or more networks and allows communication between them. It routes traffic between different subnets like a local network and the internet.
2) Proper configuration of a router is needed for networking and internet access. This involves settings like IP addresses, default gateways, and DNS servers for the router and connected devices.
3) Configuring a router typically involves accessing a web-based administrative panel to set up the WAN connection, local network, wireless access point, security, and other options like DHCP server settings.
Similar to Introduction to Networking Commands & Software (20)
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
3. Review of LastWeek
• Last week, we have gone through:
– Network applications in clients (software)
– Network services in servers (software)
– Servers-clients relationship (software)
– End-devices and networking devices (hardware)
– IP address (software – addressing scheme)
– Port numbers (software – addressing scheme)
4. Network Software
• The majority of this class is to deal with software issues of
the network.
• There are four categories of software in networks:
– Client software (network application)
– Server software (network services)
– Networking software
• This is new. The topic of this lecture.
– Protocol
• This is in the future of this class.
• As we have talked about “client-server”, now we need to
deal with “client-network-server”.
5. Clients-Networks-Servers
• PCs (or hosts, workstations, end devices, and printers) communicatewith
other PCs (servers or other clients), via the network (or Internet).
• However, most users don’t know (or even care) how’s the
network/Internet is being run, but they do care which network services
they can communicate/access.
– When you type www.google.com in your web browser, you just hope to go to
a web site (hosted in a server)
– When you write email to kp.koon@help.edu.my, you just hope that I will read
your email (I read from a mail server which received your email)
– When you’re chatting with somebody, you are using a PC to “talk” to another
user of a PC
• While using the client programs, the client users only “see” thenetwork
services, the client users don’t “see” the network which acts as the
middle-man that delivers the information to the client users .
6. “Transparency” of the Network
• The PCs (or you) won’t realize what is in the
network/Internet
– You don’t know whether you communicate
via a switch or thru two switches, or thru a lot
of routers and switches
– Your computer only knows the other
computers (e.g. especially server).
– You just use the network to reach somebody
or some other PCs.
Switch
Switch
• Hence, the effect of “transparency” of the
network
– For you, PC to PC via 1 switch is almost the
same as passing through 10 switches and
routers (maybe just a little slower)
– You just assume that network is working fine.
• Unless you use networking software to
explore the network, otherwise you just
“assume” the network/Internet is working
fine and use it.
=
Appear the same
to the user
Wide areanetwork
7. Three categories of Network Software
• Again, there are 4 different type of network software that “deal” withthis
“servers-network-clients”
• Network clients software (you know this already)
– What we use the most (acquiring information or data)
• Web browser (Firefox), email reader (Outlook), etc
• Server software (you know this already)
– Turn a PC into a server
• Apache web server
• Networking software/commands (this is new to you)
– Help to explore and troubleshoot the network
– Command-line form
• tracert, ipconfig, ping, etc
– GUI (graphic user interface) form
• Wireshark, Net Tools 5, Free IP Tools, Axence Nettools Pro
• Protocols (this is new to you, will be taught in the later lectures)
8. Networking software/commands
• There are some difference between network
clients software and networking software
– Network clients help you to access services
– Networking software help you to
• explore the network,
• configure network devices
• troubleshoot the network,
• collect network statistics
• polling and testing the network
• manage the network
• access certain network status and parameters.
9. Networking software/commands
• As in network client software, networking software
comes in the form of
– Command line
– GUI (graphic user interface)
• We will learn a number of widely used networking
commands and software.
• Beware: there are some commands in the
following slides that are…
– not networking software but pure client software !!
– both networking software and client software !!
11. Setting Up Your Source IP
Configuration
You need to set this up first before
you can access the network
12. Setting IP in Windows 10 -1
• Assume that you have a network interface card (NIC)
and are connected to the Internet (either through
Streamyx, Green Packet, or at HELP).
• After you have plugged in, and before you explore
the network in Windows 10 (or Windows 7 or Linux
or Sun or Apple), you need to configure the following:
– Source IP address
– Subnet mask
– Default Gateway
– DNS IP address
13. Setting IP in Windows 10 -2
• In Windows 10
– Go to Start > Type
“Settings” and then
click on Settings
14. Setting IP in Windows 10 -3
• “Click on the Network
and Internet”, and
then the window like
left side appears
• Click on the “Change
adapter options”
15. Setting IP in Windows 10 -4
• “Right click any
connected network,
and select properties”
16. Setting IP in Windows 10 -5
• Scroll down the list and
then select TCP / IPv4
17. Dynamic IP
• You need the help of a DHCP service in
your network, if you use this option.
– Which means you need a DHCP server
in the network.
– DHCP = Dynamic Host Control Protocol
• Click on “obtain an IP address
automatically”.
• DHCP service will supply the IP address,
subnet mask, default gateway, and DNS
IP to your PC automatically.
• Port numbers related to DHCP are 67
and 68.
• DHCP service/server will be discussed
in the later lecture.
18. Static IP
• In static IP, you have to key in the
four parameters manually
(meaning by yourself).
• Default gateway = IP address of
the immediate router in your local
area network.
– Will explain in later lectures.
• Proper value of IP address and
subnet mask will be taught in
later lectures.
19. DNS ServerIP
• You need an IP address of a
functioning Domain Name
Server (DNS)
– DNS server converts the domain
name into destination IP address
– You don’t need to care how it is
converted, it is all handled by the
OS.
– But the OS does care that you
provide a valid DNS IP to your OS.
– Windows 10 allows you to enter
two valid DNS IP addresses.
20. If you don’t have a proper DNS IP
• You have to type the IP address (64.233.181.104) of Google web site instead of
www.google.com in order to access the web site. or IP address (209.131.36.159)
for yahoo.com
• Otherwise, the browser will prompt you an “domain name unresolved”
• Without a valid DNS IP, all the “yahoo.com”, “cnn.com”, “help.edu.my”,
“facebook.com” will NOT work in the browser.
21. Extra: Alternate Configuration
• If you have a notebook, using static IP at
home and the IP assigned by DHCP server at
the office, you can make use of alternate
configuration to set IP and network information
for these 2 different network.
• Set Obtain an IP address automatically on
“General” tab, so that the notebook will be
assigned IP addresses automatically at the
office.
• After that, click Alternate Configuration tab,
select User configured option and key in your
home network’s static IP information.
• By setting this, when there is no IP information
assigned due to no DHCP server at home, this
alternate configuration will be applied
automatically, so that you don’t have to set IP
manually every time at home.
24. Overview of ipconfig
• The first networking command that you need to learn.
• “ipconfig” is used to check the source IP configuration setting
of every network interface card (NIC) of your PC (all physical
and virtual network adapters)
– IP address
– Subnet mask
– Default gateway
• If your PC has 2 wired NICs and 1 wireless NIC, “ipconfig”
will list 3 sets of IP addresses, subnet masks and default
gateways.
• Adjust your concept of IP address now:
– IP address is a network interface address, not a PC address.
– If there are 4 NICs in a PC, there are 4 sets IP addresses for thatPC.
28. ipconfig /all
• Give a more detailed status
of the NICs that includes
– DNS server IP
– DHCP server IP
– Dynamic or static IP
(DHCP enabled?)
– MAC addresses/Physical
address.
– Lease of the DHCP
service (when will the
dynamic IP expire?)
• You will use this command
quite often
30. DHCP Service
• As compared to the services that we have studied,
such as HTTP, and SMTP, which is more as a
data/file providing service, or “middle-man” service,
• DHCP service is a networking service.
– Dealing with networking issues and not data resources.
• Normally, user does not actively access the DHCP
service.
– DHCP is “transparent” to user unless you “explore” it
specifically.
• More often, it is the operating system (OS) that
deals with DHCP service.
31. ipconfig /release
• Release the IP
address, netmask and
default gateway back
to DHCP server.
– 0.0.0.0 = no source
ip address, subnet
mask
Command is here
32. ipconfig /renew
• Make request to
the dhcp server
to get
– IP address,
– Subnet mask
– DNS IP
– Gateway IP.
Command
is here
34. DNS cache
• Please be reminded that the function of DNS is to
change the domain name to an IP address
(destination IP).
• When you visit a website, Windows tries to speed
things up by placing the DNS information about
that site, into a DNS cache on your PC.
• Without the DNS cache, your PC has to constantly
communicate with a remote DNS server.
• If previously you have visited some websites, the
IP address of the web sites will be stored in the
DNS cache in your PC.
35. ipconfig /displaydns
• You can check the IP
address of the web
sites (domain name)
that you have visited
with your browser,
with the command
ipconfig /displaydns
37. Overview of “ping”
• Your second best friend in network.
• Your most used command in the labs.
• Function:
– Check connectivity of between a remote IP and your PC
• A successful ping means that the communication
between your PC and the remote IP is okay.
– Accessing a remote service provided by this remote IP
SHOULD NOT be a problem.
• The remote IP can be a server, router, printer, or
another client PC.
• ping comes in the form of Windows command, or
GUI net tools.
38. ping
• Test whether the host is reachable
– Connectivity test between you PC and a remote host
• ping destination_ip or ping domain_name
– c:>ping 192.168.1.1
– c:>ping www.google.com.my
42. Explanation of ping result
• time = Round Trip Time (RTT)
– Time that the ping packet travel to the remote IP and back.
– time = 349ms means, ping takes 349ms to travel from your PC to
203.84.202.10 and then back to your PC.
– Also compute the minimum, maximum and average RTT.
• TTL = time-to-live
– The number of routers that the ping packet can pass before it is dropped by
the router.
– TTL = 51 means the ping packet still can travel 51 more routers.
– TTL = 51 also mean the ping packet have travel (64 – 51) = 13 routers.
46. Comments on Ping
• One of best and yet simple testing tool.
– Use ping to test a remote IP first, before you access a
particular service of that remote IP, after you have set
up a network.
– ping 192.168.1.1 before you dohttp://192.168.1.1
• If you are very sure that your network is working
fine, and yet you can’t ping a particular PC, check
the firewall (or the Symantec setting) of that PC.
– The firewall or Symantec may block the ping reply.
48. Overview of traceroute
• Trace route is an “advanced” form of ping.
• Trace route lists the IP addresses that your data will travel
between you and the destination IP.
• You can imagine that these IP addresses form a route
between you and your destination IP.
• Trace route can be in the form of command and software
package.
– The better trace route software can draw the route (listed with all
the IP) on the world map between your PC and the destination IP.
49. pathping
• pathping destination_ip
• pathping domain_name
• C:>pathping
192.168.1.1
• pathping lists all the IP that it
travels from source to
destination.
• and then compute some
statistics of the route.
50. tracert
• tracert does the similar function as pathping
– But without that “much” statistics as in pathping.
57. Overview of nslookup
• nslookup is both a client and a networking
software.
– Must have a valid DNS IP in the source IP
configuration, otherwise this command won’t
work.
• nslookup communicate with an DNS so that
it can check the IP address of a valid
domain name.
58. nslookup
www.help.edu.my)
• Obtain the public IP address of a domain name
• Need to have a proper DNS server IP first in your TCP/IP setting.
• C:>nslookup domain_name (e.g c:>nslookup
Command
is here
Command
is here
59. Public DNS IPAddresses
• 199.166.24.253 (PS0.NS1.VRX.NET)
– Toronto, ON, Canada
• 199.166.27.253 (PS0.NS3.VRX.NET)
– Richmond Hill, ON, Canada
• 199.166.28.10 (PS0.NS2.VRX.NET)
– Apopka, Fl
• 199.166.29.3
(NL.PUBLIC.BASESERVERS.NET)
– Nederlands
• 199.166.31.3 (NS1.QUASAR.NET)
– Orlando, FL, USA
• 195.117.6.25 (ZOLIBORZ.ELEKTRON.PL)
– Poland
• 38.113.2.100 (NS1.JERKY.NET)
– Boston, MA, USA
• 213.196.2.97 (PAN.BIJT.NET)
– The Netherlands
• 199.5.157.128
– Detroit
• Malaysia’s Public DNS IP
• Schoolnet (ADSL)
– 202.75.44.18
– 203.106.3.171
– 202.75.44.20
• Tmnet Streamyx (ADSL)
– 202.188.0.132
– 202.188.0.133
– 202.188.0.147
– 202.188.0.161
– 202.188.0.181
– 202.188.0.182
– 202.188.1.4
– 202.188.1.5
– 202.188.1.23
– 202.188.1.25
60. nslookup
• nslookup interactive
mode with designated
DNS server to poll.
• If a DNS is too “far”
from your PC, it will be
timed-out.
• Aliases = Other domain
names that use the
same IP address.
64. Overview of netstat
• netstat (network statistics) is a command-line tool
that displays network connections (both incoming
and outgoing), routing tables, and a number of
network interface statistics.
• One possible use for netstat is to determine if
spyware or Trojans have established connections
that you do not know about.
• The command "netstat -a" will display all your
connections. The command "netstat -b" will show
the executable files involved in creating a
connection.
66. netstat -a
• List all the
connection ports
and listening ports
that are running in
the system
67. State of the Connection
• CLOSED
– Indicates that the server has received an ACK signal from the client and the connectionis closed
• CLOSE_WAIT
– Indicates that the server has received the first FIN signal from the client and the connection is in
the process of being closed
• ESTABLISHED
– Indicates that the server received the SYN signal from the client and the sessionis established
• FIN_WAIT_1
– Indicates that the connection is still active but not currentlybeing used
• FIN_WAIT_2
– Indicates that the client just received acknowledgment of the first FIN signal from the server
• LAST_ACK
– Indicates that the server is in the process of sending its own FINsignal
• LISTENING
– Indicates that the server is ready to accept aconnection
• SYN_RECEIVED
– Indicates that the server just received a SYN signal from theclient
• SYN_SEND
– Indicates that this particular connection is open andactive
• TIME_WAIT
– Indicates that the client recognizes the connection as still active but not currently being used
68. netstat -b
• List the programs that are making network connections & their
port numbers
69. netstat –e, netstat –n, netstat-o
• -e
• -n
• -o
Displays Ethernet statistics. This may be combined with the –s option.
Displays addresses and port numbers in numerical form.
Displays the owning process ID associated with each connection.
70. netstat -s
• Displays per-protocol
statistics.
• By default, statistics are
shown for IP, IPv6, ICMP,
ICMPv6, TCP, TCPv6,
UDP, and UDPv6;
72. hostname
• Display the computer name shown in the network.
• Special hostname for 127.0.0.1 = localhost
73. getmac, getmac /v
• Displays MAC addresses for the local system and
network adapter name.
74. arp
• ARP => Address Resolution
Protocol
• “Linking” IP address to a
MAC address in a lookup
table
• Is “dynamic” since IP
address is changeable with
relative to MAC address.
• arp lookup table is stored in
cache since it is not
permanent.
• arp –a
– show all cache
• arp –d
– delete entries in cache
76. Overview of PortScanning
• Test a remote IP to see whether it offers any service.
• Since a port is a place where information goes into and out
of a computer, port scanning identifies open doors to a
computer.
• A port scanner is a software application designed to probe
a network host for open ports.
• May be blocked by firewall or Symantec intrusion detection.
– Port scanning has legitimate uses in managing networks, but port
scanning also can be malicious in nature if someone is looking for a
weakened access point to break into your computer.
77. Analogy of Network Services
• Services (or open ports) are just like data file type
– E.g. “.xls”, “.doc”, “.ppt”, “.avi”, “.jpg”, “.rm”, “.txt”.
• You need a specific application (executable) in
order to open a particular type file.
– Use Word to open “.doc”
– Use Notepad to open “.txt”
– Use Realplayer to open “.rm”
• Network services are the same.
– Use web browsers to access port 80 service.
– Use ftp to access port 21/20 services.
– Use PuTTY to access port 22/23 services.
78. nmap
• A software that you can use to
check the “open ports”
(services offered) in a
particular server.
• Can you tell what services are
available in this server?
(www.insecure.org)
79. nmap
• Command line version of nmap
Command is
here
Services
available in
this server
84. telnet
• telnet is used to remote login to a particular server to perform remote
configuration (powerful command)
• You can telnet to router, modem, and server as long as thesemachine
provide the service.
• telnet destination_ip or telnet domain_name
– c:>telnet 192.168.1.1
– c:>telnet www.google.com.my
86. ftp
Command is here
• ftp 192.168.72.5
• ftp is just to login to a file
server.
– You haven’t transferred
any file yet.
• You need the login name
and the password.
• There is whole suite of
commands after you
successfully log in to the
file server.
• put is to upload a file
• get is to download a file
• This is the old way.
• Now, we normally use the
GUI ftp software
87. PuTTY
• A GUI software that helps you to perform remote configuration.
88. Difference between
Client & Networking software
• Client software transfer, obtain, or manipulate data
and information from/in the server.
• Networking software deals mainly with network
status and network configuration information.
• However, some software/commands belong to both
(networking software and client software at the
same time)
89. Comments to Networking Commands
• There are many more networking commands….
– It will take time to learn how to use these commands/software
– We start with what we have gone through.
– We will learn more as we proceed with the class
• Some of the network commands are “common” in differentOS
– They exist in Linux, Unix and Windows
• e.g. ping, netstat,
– The command option and output may be different
• ping –i (Linux) => delay in sending out ping packets,
• ping –i (Windows) => Time to live
• Some network commands have different name but basically do thesame
function
– ipconfig (Windows), ifconfig (Linux)
• Mostly used in shell, terminal or command prompt.
• Some of the commands may not work in certain LANs since theyare
“firewalled” or “blocked”
– For example, in HELP
91. True/False Questions
• “ping” can check the delay between PCs.
• You can access a web site without using a domain name.
(e.g. msnbc.com)
• “ipconfig /all” shows the IP of the DHCP server.
• “netstat –a” shows all active port numbers and MAC address.
• Three domain names can share a single IP address.
• A near DNS serves better than a far DNS.
• “tracert” shows the list of IP address traveled between source
and destination.
• A wired NIC and a wireless NIC on the same PC can share
the same IP address.