0% found this document useful (0 votes)
30 views26 pages

Peer To Peer Connection G12

The document provides an overview of computer networking concepts, including definitions of key terms such as client/server networks, coaxial cables, and network protocols. It describes the types of networks (LAN and WAN), networking devices, and the steps involved in designing, rolling out, configuring, and managing a network. Additionally, it covers the basics of setting up a peer-to-peer network and the importance of internet protocols in network communication.

Uploaded by

usezonlee
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views26 pages

Peer To Peer Connection G12

The document provides an overview of computer networking concepts, including definitions of key terms such as client/server networks, coaxial cables, and network protocols. It describes the types of networks (LAN and WAN), networking devices, and the steps involved in designing, rolling out, configuring, and managing a network. Additionally, it covers the basics of setting up a peer-to-peer network and the importance of internet protocols in network communication.

Uploaded by

usezonlee
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

12

SENIOR HIGH SCHOOL

PEER to PEER

COMPUTER
SYSTEM SERVICING

Answer: Pre-test Pg. 6


Activity 1 pg. 25
Activity 2 pg. 26

1
Client/serverNetwork- a computer network in which one centralized, powerful
computer called server is a hub to which many less powerful personal compters or
workstations called clients are connected.
Coaxial cable- a type of wire that consists of a center wire surrounded by insulation
and then a grounded shield of braided wire which minimizes electrical interference.
Configuration- the way a system is set up. Configuration can refer to either
hardware or software, or the combination of both.
Cross-over- is a cable used to connect two network devices directly.
Direct X- a set of APIs developed by Microsoft that enables programmers to write
programs that access hardware features of a computer without knowing exactly what
hardware will be installed on the machine where the program eventually runs.
Fiber optic- is a technology that uses glass (or plastic) threads (fibers) to transmit
data. Fiber optics has several advantages over traditional metal communications
lines.
IP Address- is a number that is used to identify a device on the network.
IP config- is a command used to find out the IP address of a certain network.
Network- is a group of two or more computer systems linked together.
Peer-to-peer Network- a type of network in which each workstation has equivalent
capabilities and responsibilities.
Ping- a command prompt used to test the ability of the source computer to reach a
specified destination computer.
Protocol- is the special set of rules that end points in a telecommunication
connection use when they communicate.
Registry- is a database used by Windows operating system to store
configuration information.
RJ45- short for Registered Jack-45, it is an eight-wire connector used commonly to
connect computers onto a Local-Area Network (LAN).
Security- techniques for ensuring that data stored in a computer cannot be read or
compromised by any individuals without authorization
Straight-through- is used in local area network to connect a PC to a network hub
and router.
Subnet mask- is used to determine what subnet an IP address belongs to. An IP
address has two components, the network address and the host address.
Twisted pair- is a type of cable that consists of two independently insulated wires
twisted around one another.
2
Virus- is a program or piece of code that is loaded onto your computer without your
knowledge and runs against your wishes.

NETWORK
A network consists of two or more computers that are linked in order to
share resources (such as printers and CD-ROMs), exchange files, or allow
electronic communications. The computers on a network may be linked through
cables, telephone lines, radio waves, satellites, or infrared light beams.

There are three basic types of networks which includes the following:

• Local Area Network (LAN)


• Wide Area Network (WAN)

Local Area Network

A Local Area Network (LAN) is a network that is confined to a relatively


small area. It is generally limited to a geographic area such as a writing lab, school,
or building. Rarely are LAN computers more than a mile apart.
In a typical LAN configuration, one computer is designated as the file
server. It stores all of the software that controls the network, as well as the
software that can be shared by the computers attached to the network.
Computers connected to the file server are called workstations. The workstations
can be less powerful than the file server, and they may have additional software
on their hard drives. On most LANs, cables are used to connect the network
interface cards in each computer.
Wide Area Network
Wide Area Networks (WANs) connect larger geographic areas, such as
Florida, the United States, or the world. Dedicated transoceanic cabling or satellite
uplinks may be used to connect this type of network.
Networking Devices
Consist of, but are not limited to non-local printers, workstations, servers,
webcams, data loggers, instruments, dial-in devices, and, in general anything that
requires an Ethernet connection. These devices are supported on a best-effort
basis limited by the staffing and equipment level available.
Hub is a small, simple, inexpensive device that
joins multiple computers together. Many network
hubs available today support the Ethernet
3
standard. Other types including USB hubs also
exist, but Ethernet is
the type traditionally used in home
networking.

Ethernet switch is a device that gathers the


signals from devices that are connected to
it, and then
regenerates a new copy of each signal.

Bridge is a device filters data traffic at a


network boundary. Bridges reduce the amount of
traffic on a LAN
by dividing it into two segments.

Routers are small physical devices that join multiple


networks together.

Network gateway is an internetworking


system capable of joining together two networks
that use different base protocols. A network
gateway can be implemented completely in
software, completely in
hardware, or as a combination of
both.

Modem is a contraction of the terms modulator


and demodulator. Modems perform a simple
function: They translate digital signals from a

4
computer into analog signals that can travel
across conventional phone lines. The modem
modulates the signal at the sending end and
demodulates at the receiving end

Network interface is a device that connects a client computer, server, printer or

other component to your network. Most often, a network


interface consists of a small electronic circuit board that is
inserted into a slot inside a computer or printer.
Alternatively, some computers, printers, or other services
include network interfaces as part of their main circuit
boards (motherboards).

Network firewall protects a computer network


from unauthorized access. Network firewalls may
be hardware devices, software programs, or a
combination of the two. Network firewalls guard an
internal computer network (home,
school, business intranet) against malicious
access from the outside. Network firewalls may
also be configured to limit access to the outside
from internal users
Pre-test
Direction: Identify what is being described in the following sentences and write
your answer on a separate sheet of paper.
1. It protects a computer network from unauthorized access.
2. Type of network that connect larger geographic areas, such as Florida, the
United States, or the world.
3. This is an internetworking system capable of joining together two
networks that use different base protocols.
4. It is consists of two or more computers that are linked in order to share
resources (such as printers and CD-ROMs), exchange files, or
allow electronic communications.
5. They translate digital signals from a computer into analog signals that
can travel across conventional phone lines.

5
6. It is a device that connects a client computer, server, printer or
other component to your network.
7. A device filters data traffic at a network boundary.
8. It is a device that gathers the signals from devices that are connected
to it, and then regenerates a new copy of each signal.
9. It is a small, simple, inexpensive device that joins multiple
computers together.
10. Type of network that is confined to a relatively small area.

Computer Networks
Networks are collections of computers, software, and hardware that are all
connected to help their users work together. A network connects computers
by means of cabling systems, specialized software, and devices that manage
data traffic. A network enables users to share files and resources, such as
printers, as well as send messages electronically (e-mail) to each other.
The most common networks are Local Area Networks or LANs for short. A
LAN connects computers within a single geographical location, such as one office
building, office suite, or home. By contrast, Wide Area Networks (WANs)
span different cities or even countries, using phone lines or satellite links.
Network System Configuration
All networks go through roughly the same steps in terms of design,
rollout, configuration, and management.
Designing Your Network
Plan on the design phase to take anywhere from one to three working days,
depending on how much help you have ad how big your network is.
Here are the key tasks:
• Settle on a peer-to-peer network or a client/server network.
• Pick you network system software.
• Pick a network language.
• Figure out what hardware you need.
• Decide on what degree of information security you need.
• Choose software and hardware solutions to handle day-to-day
management chores.

Rolling Out Your Network


Rolling out your network requires the following steps:
• Run and test network cables.

6
• Install the server or servers if you’re setting up a client/server network. (If
you are setting up a peer-to-peer network, you typically don’t have to worry
about any dedicated servers.)
• Set up the workstation hardware.
• Plug in and cable the Network Interface Cards (NICs – these connect the
network to the LAN).
• Install the hub or hubs (if you are using twisted-pair cable).
• Install printers.
• Load up the server software (the NOS, or Network Operating System) if
your network is a client/server type.
• Install the workstation software.
• Install modem hardware for remote dial-up (if you want the users to be
able to dial into the network).
• Install the programs you want to run (application software).
Configuring Your Network
Network configuration means customizing the network for your own use.
• Creating network accounts for your users (names, passwords, and groups).
• Creating areas on shared disk drives for users to share data files.
• Creating areas on shared disk drives for users to share programs
(unless everyone runs programs from their own computer).
• Setting up print queues (the software that lets users share networked
printers).
• Installing network support on user workstations, so they can "talk" to
your network.
Managing Your Network
The work you do right after your LAN is up and running and configured can save
you huge amounts of time in the coming months.
• Mapping your network for easier management and troubleshooting.
• Setting up appropriate security measures to protect against accidental
and intentional harm.
• Tuning up your LAN so that you get the best possible speed from it.
• Creating company standards for adding hardware and software, so you don’t
have nagging compatibility problems later.
• Putting backup systems in place so that you have copies of data and
programs if your hardware fails.
• Installing some monitoring and diagnostic software so that you can check on
your
network’s health and get an early warning of impleading problems.
• Figuring out how you plan to handle troubleshooting – educating your LAN
7
administrator, setting up a support contract with a software vendor, and so on

Smooth Setup
One key advantage of a peer-to-peer network is that it’s easy to setup. With the
simplest sort of peer-to-peer network, you just use the built-in networking that
comes with your operating system (Windows 98, Windows XP, Windows
7, Windows 8 and so on) and you have very little software to set up – even less
if you have computers that have the operating system preinstalled, as most
computers do these days.
For Windows XP and Windows 7, the basic steps to setting up a peer-to-
peer network are as follows:
(Review for Cabling) UTP Cable

A UTP cable (category 5) is one of the most popular LAN cables. This
cable consists of 4 twisted pairs of metal wires (that means there are 8 wires in
the cable). Adding RJ45 connectors at both ends of the UTP cable it becomes a
LAN cable they usually use.
Preparation
You need a UTP Cable, Crimping Tool, RJ45, and Cutter

Figure24. Materials for Cabling

Making Cable
Follow the steps below.
1. Remove the outmost vinyl shield for 12mm at one end of the cable (we call
this side A-side).
8
2. Arrange the metal wires in parallel (refer the each section's wire
arrangement table). Don't remove the shield of each metal line.
3. Insert the metal wires into RJ45 connector on keeping the metal
wire
arrangement.
4. Set the RJ45 connector (with the cable) on the pliers, and squeeze it tightly.
5. Make the other side of the cable (we call this side B-side) in the same way.
6. After you made it, you don't need to take care of the direction of the cable.
(Any cable in this page is directionless --- that means you can set either end
of the cable to either device.)
How to see the wire arrangement
Take the UTP cable with your left hand and a RJ45 connector with your
right hand. Hold the RJ45 connector in the way you can see the contact metal
face of the

The tables below are for the case where the UTP cable consists of
green/green-white, orange/orange-white, blue/blue-white, brown/brown-white
twisted pairs.

10 Base T / 100 Base T Straight


10BaseT and 100BaseT are most common mode of LAN. You can use
UTP category-5 cable for both modes. (You can use UTP category-3 cable for
10BaseT, in which there are only 3 wires inside the cable.)
A straight cable is used to connect a computer to a hub. You can use it to
connect 2 hubs in the case one of the hubs has an uplink port (and you use
normal port on the other hub)

Pin ID side A side B

9
1 orange-white orange-white

2 orange orange

3 green-white green-white

4 blue blue

5 blue-white blue-white

6 green green

7 brown-white brown-white

8 brown brown

10 Base T / 100 Base T Cross


A cross cable for 10BaseT and 100BaseT is used to connect 2
computers directly (with ONLY the UTP cable). It is also used when you connect
2 hubs with a normal port on both hubs. (In other words, the cross cable is used
relatively in a rare
case.)

Pin ID side A side B


1 orange-white green-white

2 orange green
3 green-white orange-white
4 blue blue

5 blue-white blue-white
6 green orange

7 brown-white brown-white
8 brown brown

10
To create a peer network, you must have the following component
• A network interface or Local Area Network (LAN) adapter for each computer. The same
manufacturer and model of network card is preferred.
• Cabling that is supported by the network cards.
• Windows servers or 7 drivers for the network cards.
• A common network protocol.
• A unique computer name

Internet Protocols
A protocol is a set of rules. A letter sent through the postal system
also uses protocols. Part of the protocol specifies where on the envelope the
delivery address needs to be written. If the delivery address is written in the
wrong place, the letter cannot be delivered. Internet protocol works in
a similar way. Internet protocols are sets of rules governing communication
within and between computers on a network. Protocol specifications
define the format of the messages to be exchanged.
Timing is crucial to network operation. Protocols require messages to
arrive within a certain amount of time so that computers do not wait
indefinitely for messages that may have been lost. Therefore, systems
maintain one or more times during transmission of data. Protocols also
initiate alternative actions if the network does not meet the timing rules. Many
protocols consist of a suite of other protocols that are stacked in
layers. These layers depend on the operation of the other layers in the
suite to
function properly.
The main functions of protocols are:
• Identifying errors
• Compressing the data
• Deciding how the data should be sent
• Addressing the data
• Deciding how to announce sent and received data

To understand how networks and the Internet work, you must be


familiar with the commonly used protocols. These protocols are used to
browse the web, send and receive e-mail, and transfer data files. You will

11
encounter other protocols as your experience in IT grows, but they are not
used as often as the common protocols described here:
• TCP/IP: The Transmission Control Protocol /Internet Protocol
(TCP/IP) suite of protocols has become the dominant standard for
internetworking. TCP/IP represents a set of public standards that
specify how packets of information are exchanged between
computers over one or more networks.
• IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange
is the protocol suite originally employed by Novell Corporation’s
network operating system, NetWare. It delivers functions similar to
those included in TCP/IP. Novell in its current releases supports the
TCP/IP suite. A large installed base of NetWare networks continues to
use IPX/SPX.
• NetBEUI: NetBIOS Extended User Interface is a protocol used
primarily on small Windows NT networks. NetBEUI cannot be routed or
used by routers to talk to each other on a large network. NetBEUI is
suitable for small peer-to-peer networks, involving a few computers
directly connected to each other. It can be used in conjunction with
another routable protocol such as TCP/IP. This gives the network
administrator the advantages of the high performance of NetBEUI
within the local network and the ability to communicate beyond the
LAN over TCP/IP.

• AppleTalk: AppleTalk is a protocol suite used to network


Macintosh computers. It is composed of a comprehensive set of
12
protocols that span the seven layers of the Open Systems
Interconnection (OSI) reference model. The AppleTalk protocol was
designed to run over LocalTalk, which is the Apple LAN physical
topology. This protocol is also designed to run over major LAN
types, notably Ethernet and Token Ring.
• HTTP: Hypertext Transfer Protocol governs how files such as
text, graphics, sound, and video are exchanged on the World Wide
Web (WWW). The Internet Engineering Task Force (IETF) developed
the standards for HTTP.
• FTP: File Transfer Protocol provides services for file transfer
and manipulation. FTP allows multiple simultaneous connections to
remote file systems.
• SSH: Secure Shell is used to securely connect to a remote computer.
• Telnet: It is an application used to connect to a remote computer
that lacks security features.
• POP3: Post Office Protocol is used to download e-mail from a
remote mail server.
• IMAP: Internet Message Access Protocol is also used to
download e-mail from a remote mail server.
• SMTP: Simple Mail Transfer Protocol is used to send e-mail to
a remote e-mail server.
The more you understand about each of these protocols, the more
you will understand how networks and the Internet work.

IP Addressing
An IP address is a number that is used to identify a device on the
network. Each device on a network must have a unique IP address to
communicate with other network devices. Network devices are those
that move data across the network, including hubs, switches, and routers. On
a LAN, each host (device that sends or receives information on the
network) and network device must have an IP address within the same
network to be able to communicate with each other.
A person’s name and fingerprints usually do not change. They
provide a label or address for the person’s physical aspect—the body. A
person’s mailing address, on the other hand, relates to where the person
lives or picks up mail. This address can change. On a host, the Media
Access Control

13
(MAC) address is assigned to the host Network Interface Card (NIC) and is
known as the physical address. The physical address remains the same
regardless of where the host is placed on the network in the same way that
fingerprints remain with someone regardless of where he or she goes.
An IP address consists of a series of 32 binary bits (1s and 0s). It is
very difficult for humans to read a binary IP address. For this reason, the 32
bits are grouped into four 8-bit bytes called octets. An IP address, even in this
grouped format, is hard for humans to read, write, and remember. Therefore,
each octet is presented as its decimal value, separated by a decimal point or
period. This format is called dotted-decimal notation. When a host is
configured with an IP address, it is entered as a dotted-decimal number, such
as 192.168.1.5.

Imagine if you had to enter the 32-bit binary equivalent of this:


11000000101010000000000100000101. If you mistyped just 1 bit, the
address would be different, and the host may not be able to communicate
on the network. The logical 32-bit IP address is hierarchical and is
composed of two parts. The first part identifies the network, and the
second part identifies a host on that network. Both parts are required in an
IP address. For example, if a host has an IP address of 192.168.18.57,
the first three octets, 192.168.18, identify the network portion of the
address, and the last octet, 57, identifies the host. This is called
hierarchical addressing, because the network portion indicates the
network on which each unique host address is located. Routers only need
to know how to reach each network, not the location of each individual
host.

Table 6. Five Classes of IP Address

IP Classes Purpose
Class A Used for large networks, implemented by large companies and
some countries
Class B Used for medium-sized networks, implemented by universities
Class C Used for small networks, implemented by ISPs for customer
subscriptions
Class D Used for special use for multicasting
Class E Used for experimental testing
14
Subnet Mask
The subnet mask indicates the network portion of an IP address. Like
the IP address, the subnet mask is a dotted-decimal number. Usually all hosts
within a LAN use the same subnet mask. Table 3 shows default subnet
masks for usable IP addresses that are mapped to the first three classes of IP
addresses:
• 255.0.0.0: Class A, which indicates that the first octet of the IP address
is the network portion
• 255.255.0.0: Class B, which indicates that the first two octets of the IP
address are the network portion
• 255.255.255.0: Class C, which indicates that the first three octets
of the IP address are the network portion

Table 7. Default Subnet Masks for Usable IP Addresses


Class A Network Host
Octet 1 2 3 4

Class B Network Host


Octet 1 2 3 4

Class C Network Host


Octet 1 2 3 4

Class D addresses are used for multicast groups. There is no need to


allocate octet or bits to separate network and host addresses. Class E
addresses are reserved for research use only.
IpConfig
Ipconfig is a command used to find out the IP address of a certain
network you are connected to.
How to use the ipconfig command?
1) Click on Start Button, then type cmd (command prompt) on
the search box.
2) A black screen will appear as shown in the figure beloW

15
Figure 51. Command Prompt Window
3) Type ipconfig and press enter. The figure below shows the IP configuration
window using the ipconfig command. The information from this window will be
useful because it shows the IP address, subnet mask and default gateway of
a network you are connected
to.

Figure 52. IP Configuration in CMD Wind

Testing Network Connection with Ping Symptoms:


• wants to test the network using Ping
• wants to test the latency of the network

16
1. Open the Command Prompt or Terminal. Every operating system has
a command line interface that will allow you to run the Ping command.
The Ping command operates virtually and identically on all systems.
If using Windows, open the Command Prompt. Click the
Start button and enter "cmd" into the Search field. Windows 8
users can type "cmd" while on the Start screen. Press Enter
to launch the Command Prompt.
2. Type ping followed by an IP address or a website address then
press Enter key to execute the command. Here is a brief explanation
of commonly used ping commands:
o ping 127.0.0.1 (This is a "loopback ping" - your computer trying to
talk to itself. If the loopback step fails, it might be because the TCP
drivers are corrupted, the network adapter might not be working, or
another service is interfering with IP.)
o ping <IP address> (This will ping the IP address of a device like a
local computer, remote server or any client that receives an IP
address to verify that it is reachable and that you can communicate
with it properly.) Example: ping 192.168.1.1 (this is the default IP
address of NETGEAR routers)
o ping<website address> (This command will test for the Internet
connectivity and DNS functionality.) Example: ping
www.netgear.com, ping google.com

Here is a screenshot of a successful ping test:

Figure 1.Command Prompt with Ping command


The first arrow shows the computer we are trying to reach is responding. (The
DNS address "www.netgear.com" is displayed into the equivalent IP

17
address, 10.1.1.86.) This also shows that the computer is online and it
has Internet access.
The second arrow shows that all of the sent packets are received
showing that there is 0% loss. This means that the connection is available
and stable.
The third arrow shows the average time it took to answer. "Average =
0ms" is the best possible result. This kind of result is usually received if
the device you tried to reach is within the same network.
Assigning a static IP Address
In a home network with several computers and devices, it is ideal to assign
each of them a specific address. This is for the purpose of avoiding
problems when you do troubleshooting which requires figuring out the IP
address of each of them. It is also a means to prevent address conflicts
between the devices. You can also manage them with ease if you have
assigned their own addresses.
Here are the procedures in assigning an IP Address on a windows base
computer system:

1. Open the Control Panel’s Network Connections icon.


2. Open the icon representing your computer’s network connection.
3. Click the Properties button in the Status dialog box.
4. From the list of items, choose Internet Protocol (TCP/IP).

18
5. Click the Properties button. The Internet Protocol (TCP/IP) Properties
dialog box appear.

Figure TCP / IPV4 Dialog Box

6. Type the IP address for your computer. Enter the appropriate IP


Address in the IP address section.
7. Type a subnet mask. The value used on a local network is
commonly 255.255.255.0, but it can be different, such as
255.255.255.127.
8. Type the default gateway address. The default gateway is the router,
so type the router’s address. Figure 54 shows an example of assigning an
IP Address, Subnet mask and default gateway.

19
9. Type the address for the preferred DNS server. The address should be
obtained from your Internet Service Protocol. It is used to help your
computer find web pages and other addresses on the internet.
10. Type the address for the alternate DNS server.
The alternate Domain Name System (DNS) server’s IP address is
something that your ISP provides.
11. Click OK to confirm the settings.
12. Close all other open dialog boxes and windows.

Assigning a Dynamic IP Address


If more than a few computers comprise the LAN, manually configuring
IP addresses for every host on the network can be time-consuming and prone
to errors. In this case, using a Dynamic Host Configuration Protocol (DHCP)
server would automatically assign IP addresses and greatly simplify the
addressing process.

Figure 56. Assigning a Dynamic IP Address


Dynamic Host Configuration Protocol (DHCP) is a software utility
used to dynamically assign IP addresses to network devices. This dynamic
process eliminates the need to manually assign IP addresses. A DHCP
server can be set up and the hosts can be configured to automatically obtain
an IP address. When a computer is set to obtain an IP address automatically,
the other entire IP addressing configuration boxes are dimmed or disabled.
20
The server maintains a list of IP addresses to assign, and it manages the
process so that every device on the network receives a unique IP address.
Each address is held for a predetermined amount of time. When the time
expires, the DHCP server can use this address for any computer that joins
the network.
These are the IP address information that a DHCP server can assign to
hosts:
• IP address
• Subnet mask
• Default gateway
• Optional values, such as a Domain Name System (DNS) server
address
The DHCP server receives a request from a host. The server then selects
IP address information from a set of predefined addresses that are stored in a
database. After the IP address information is selected, the DHCP server offers
these values to the requesting host on the network. If the host accepts the offer,
the DHCP server leases the IP address for a specific period of time.
Using a DHCP server simplifies the administration of a network
because the software keeps track of IP addresses. Automatically configuring
TCP/IP also reduces the possibility of assigning duplicate or invalid IP addresses.
Before a computer on the network can take advantage of the DHCP server
services, the computer must be able to identify the server on the local network.
You can configure a computer to accept an IP address from a DHCP server by
clicking the Obtain an IP address automatically option in the NIC configuration
window, as shown in Figure 56.
If your computer cannot communicate with the DHCP server to obtain an
IP address, the Windows operating system automatically assigns a private IP
address. If your computer is assigned an IP address in the range of
169.254.0.0 to 169.254.255.255, it can communicate with only other computers
in the same range. An example of when these private addresses would be useful
is in a classroom lab where you want to prevent access outside to your network.
This operating system feature is called Automatic Private IP Addressing
(APIPA). APIPA continually requests an IP address from a DHCP server for
your computer

21
Ping
The ping is a Command Prompt command used to test the ability of the source computer to
reach a specified destination computer. The ping command is usually used as a simple way to
verify that a computer can communicate over the network with another computer or network
device.

The ping command operates by sending Internet Control Message Protocol (ICMP) Echo
Request messages to the destination computer and waiting for a response. How many of
those responses are returned, and how long it takes for them to return, are the two major
pieces of information that the ping command provides.

Syntax Description
-t Using this option will ping the target until you force it to stop
using Ctrl-C.

-a - This ping command option will resolve, if possible,


the hostname of an IP address target.

-n count This option sets the number of ICMP Echo Request messages
to send. If you execute the ping command without this option,
four requests will be sent.
-l size Use this option to set the size, in bytes, of the echo request
packet from 32 to 65,527. The ping command will send a 32
byte echo request if you do not use the -l option.
-f Use this ping command option to prevent ICMP Echo Requests
from being fragmented by routers between you and the target.
The -f option is most often used to troubleshoot Path Maximum
Transmission Unit (PMTU) issues.
-i TTL This option sets the Time to Live (TTL) value, the maximum of
which is 255.
-v TOS This option allows you to set a Type of Service (TOS) value.
Beginning in Windows 7, this option no longer functions but still
exists for compatibility reasons.

22
-r count Use this ping command option to specify the number
of hops between the computer and the target computer or
device that you would like to be recorded and displayed. The
maximum value for count is 9 so use the tracert
command instead. If you are interested in viewing all hops
between two devices.
-s count Use this option to report the time, in Internet Timestamp
format, that each echo request is received and echo reply is
sent. The maximum value for count is 4 which means that only

Table 8. Ping Command Syntax

the first four hops can be time stamped.


-w timeout Specifying a timeout value when executing the ping command
adjusts the amount of time, in milliseconds, that ping waits for
each reply. If you do not use the -w option, the default timeout
value is used which is 4000, or 4 seconds.
-R This option tells the ping command to trace the round trip path.
-S srcaddr Use this option to specify the source address.
-4 This forces the ping command to use IPv4 only but is only
necessary if target is a hostname and not an IP address.
-6 This forces the ping command to use IPv6 only but as with
the -4 option, is only necessary when pinging a hostname.

target This is the destination you wish to ping, which is either an IP


address or a hostname.
/? Use the help switch with the ping command to show detailed
help about the command's several options.

Using the ping Command


Ping is one of your most important tools in troubleshooting Internet
problems. It shows you whether the Domain Name Server is working, whether
the computer you are trying to talk to is reachable, and how long it takes to
get there. It does this at a very low level — only the most basic Internet functions
have to be up and running.
1) Click on Start Button, then type cmd (command prompt) on the
search box.
2) A black screen will appear as shown in the figure below.
3) Type ping followed by the IP address you desire to verify. The
figure below shows the screen of the ping command and its output.

23
Figure Step 3

Figure 58.
Pinging

This output shows several things:


✓ Decoding names to network addresses — A domain name server
(DNS) resolves machine names to numeric addresses. A single
machine can have many names, all of which resolve to the same
Internet address. In the example just given, the name www.google.com
resolves to the Internet address 122.2.152.23.
✓ Round-trip response time — The parts of the replies that say
things like time=105ms show you how long it took from the time the
client machine sent out the ping message until a reply came back (1
ms is 1 millisecond, or one thousandth of a second). The variability
in the time you see reflects that networks do not always respond
identically. Differing amounts of traffic on the communication
lines or differing loads on the server are common causes. You will
see very different response times depending on the access
equipment you use.
✓ Routing hop count — The part of the replies that says TTL=50 tells
you about the route the message took from one point to another. The
acronym TTL stands for Time to Live, which is a measure of how many
rerouting from one point to another the packet has to go through before
IP declares it undeliverable. The number following TTL (called the hop

24
count) is a number that usually starts at 255 and counts down by one
every time the message gets rerouted through an intermediary
computer.

ACTIVITY I. Protocols
Directions: In this worksheet, write the name of the protocol and the default
port(s) for each protocol definition in the table. Do this on your notebook.
Be prepared to discuss your answers in front of the class.
Protocol Definition Protocol Default
Port(s)

Provides connections to computers over a


TCP/IP network

Sends e-mail over a TCP/IP network


Translates URLs to IP address
Transports Web pages over a TCP/IP network
Automates assignment of IP address on a
network
Securely transports Web pages over a TCP/IP
network

Transports files over a TCP/IP network

25
ACTIVITY II. Identifying IP
Address Classes
Directions: In this worksheet, your teacher will write several IP addresses
with their appropriate subnet masks. You will copy the IP address and Subnet
Mask. You will write which IP Address Class is appropriate in the IP Address
Class column in the chart below. An example has been provided for you.
Be prepared to discuss the IP Address Class you select.
IP Address Subnet Mask IP Address Class
10.0.0.0 255.0.0.0 A

Post-Test
Directions: Give the complete meaning of the following acronyms. Write your
answer in a separate sheet of paper.
1. UTP
2. STP
3. IP
4. TCP /IP
5. HTTP
6. FTP
7. SSH
8. IMAP
9. SMTP
10. DHCP
11. DNS
12. TTL
13. LAN
14. VPN
15. NIC

26

You might also like