0% found this document useful (0 votes)
59 views90 pages

Networking Basics

Uploaded by

Biswajit Mondal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views90 pages

Networking Basics

Uploaded by

Biswajit Mondal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 90

Computer

Networking

Basics & Troubleshooting


Computer Network

What is meant by the term


“Computer Network”

 Computers linked together.


 System for communication between 2 devices.

 To connect two or more computers together with the


ability to communicate with each other.
Computer Network

“Computer Network” is an interconnected


collection of autonomous computers.

2 or more computers are said to be interconnected


if they are able to exchange information.

By requiring the computers to be autonomous


means ‘there is no master/slave’ relationship. If one
computer can forcibly start, stop or control other,
the computers are not autonomous.
Computer Network

 A computer network is a system for communication


between computers. These networks may be fixed
(cabled, permanent) or temporary (as via modems).

• In the simplest sense, networking means connecting


computers so that they can share files, printers,
applications, and other computer-related resources.
Computer Network

 We connect the computers to share:


 Folders
 Peripheral Devices
 Messages
 Applications
 Database
Other devices give capability for sharing
above, but they do not get shared.
Computer Network

Goals of computer networking:

 Increased manageability
 Security
 Efficiency
 Cost-effectiveness
Categorizing
Computer Networks

 Local Area Networks


 Metropolitan Area Networks
 Wide Area Networks

• Client - Server
• Peer To Peer (P2P)
Local Area Network

A local area network (LAN) is a computer


network covering a small local area, like a
home, office or small group of buildings
such as a college. Current LANs are most
likely to be based on switched Ethernet or
WiFi technology running at from 10 to
1000Mb/s (megabits per second).
Metropolitan Area Network

Metropolitan Area Networks (MAN) are


large computer networks usually spanning a
campus or a city. They typically use wireless
infrastructure or optical fiber connections to
link their sites.
Wide Area Network

A wide area network (WAN) is a computer


network covering a wide geographical area,
involving a vast array of computers. This is
different from personal area networks
(PANs), metropolitan area networks
(MANs) or local area networks (LANs) that
are usually limited to a room, building or
campus. The best example of a WAN is the
Internet.
Wide Area Network

WANs are used to connect local area


networks (LANs) together, so that users and
computers in one location can communicate
with users and computers in other locations.
Client - Server

The Client/Server is a scalable


architecture, whereby each computer or
process on the network is either a client or a
server. The no. of client computers is more
than the Server Computers in such
networks.
Client - Server

Server software generally runs on powerful


computers dedicated for running an application.

Client software generally runs on common PCs


or workstations. Clients get most of their
information and rely on the application server
for things such as files, business application
programs, or to offload compute-intensive
application tasks back to the server in order to
keep the client computer free to perform other
tasks.
Client - Server

 Properties of a server:
 Passive (Slave)
 Waiting for requests
 On requests serves them and send a reply

 Properties of a client:
 Active (Master)
 Sending requests
 Waits until reply arrives
Client - Server
Client - Server

 A typical example for a Client – Server


architecture is an FTP server where the
client and server programs are quite
distinct, clients initiate the
download/uploads and the servers
respond to requests.

 Another example for a Client – Server


architecture is Domain trees & forests of
active directory.
Peer to Peer ( P2P)

Peer-to-Peer, or abbreviated P2P, is a type


of network in which each workstation has
equivalent capabilities and responsibilities.
Peer to Peer ( P2P)

This differs from client/server


architectures, in which some computers are
dedicated to serving the others. Peer-to-peer
networks are generally simpler, but they
usually do not offer the same performance
under heavy loads.
Peer to Peer ( P2P)

 A pure peer-to-peer network does not


have the notion of clients or servers, but
only equal peer nodes that simultaneously
function as both "clients" and "servers" to
the other nodes on the network. This
model of network arrangement differs
from the client-server model where
communication is usually to and from a
central server.
Peer to Peer ( P2P)

 It relies on the computing power and bandwidth


of the participants in the network rather than
concentrating it in a relatively few servers.

 P2P networks are typically used for connecting


nodes via largely ad hoc connections. Such
networks are useful for many purposes, like
haring content files containing audio, video, data
or anything in digital format.
Peer to Peer ( P2P)

 An example of Peer-to-peer
networking is the implementation of
a workgroup consisting of computers
running Microsoft Windows or any
other network operating system.
Comparison

 P-2-P (Workgroup)  Client-Server


 Easy Administration  Difficult
 No Sys. Admin administration
required  Needs Sys Admin
 Low cost  High Cost (h/w)
 Group of small n/w  Very large n/w
 No or Low Security  High Security
 Segregated Resources  Centralized Resource
& Management & management
Domain
&
Workgroup
Workgroup
• Workgroup: A logical grouping of
networked computers that can share
resources with each other. Also called
peer-to-peer n/w. A user who wants to log
on to a computer must have an account in
that computer’s local security database. A
user with an account on one computer
doesn’t necessarily have any permissions
or rights to resources on other computers.
Domain
• Domain: a collection of computers that share a
common domain database and security policy.
The domain database is stored by one or more
Servers called “domain controller”. Workstations
are members of domain. Administrator can
control users, computers & other resources
centrally from DC.
• As the data is stored centrally, a user can use
his account name & password to log on to any
member computer (provided he has rights to do
so).
Network Topology

A network topology is the pattern of links


connecting pairs of nodes of a network. A
given node has one or more links to others,
and the links can appear in a variety of
different shapes.
Network Topology

 Bus network topology


 Star network topology
 Ring network topology
 Mesh network topology
 Hybrid topology
Difference b/w LAN & WAN

The defining characteristics of LANs in


contrast to WANs are:

(a) much higher data rates,


(b) smaller geographic range, and
(c) they do not involve leased
telecommunication lines.
Broadcast
Broadcasts take place when broadcast packets
(or frames) are sent over the network. These
packets contain a special address that instructs
every station on the network to accept and process
the packet. Broadcasts are typically used for
announcements by network services, for resolving
names into addresses, and other similar functions.
Broadcasts are usually not an efficient use of
network bandwidth, since only one or a few
network stations might actually be interested in the
information being broadcast
Multicast
• A technique in which a single copy of data is
sent over a network to a specific group of
computers.
• Multicast scope determines how widely the
multicast is distributed over the network.
• Multicast IP addresses are class D addresses
and fall in the range 224.0.0.0 through
239.255.255.255. For intranet use, addresses in
the range 239.*.*.* are recommended.
Discussion

Difference between
“SERVER”
&
“DESKTOP PC OR CLIENT”

(H/W & O/S Based Differences)


Checkpoint

Doubts till now???


OSI Reference Model
• Virtually all networks in use today are based in
some fashion on the Open Systems
Interconnection (OSI) standard. OSI was
developed in 1984 by the International
Organization for Standardization (ISO), a global
federation of national standards organizations
representing approximately 130 countries. The
core of this standard is the OSI Reference
Model, a set of seven layers that define the
different stages that data must go through to
travel from one device to another over a
network.
OSI Reference Model
OSI Reference Model
• Layer 7: Application - This is the layer that
actually interacts with the operating system or
application whenever the user chooses to
transfer files, read messages or perform other
network-related activities.
• Layer 6: Presentation - Layer 6 takes the data
provided by the Application layer and converts it
into a standard format that the other layers can
understand.
• Layer 5: Session - Layer 5 establishes,
maintains and ends communication with the
receiving device.
OSI Reference Model

 Layer 4: Transport - This layer maintains flow control


of data and provides for error checking and recovery
of data between the devices. Flow control means that
the Transport layer looks to see if data is coming from
more than one application and integrates each
application's data into a single stream for the physical
network.
 Layer 3: Network - The way that the data will be sent
to the recipient device is determined in this layer.
Logical protocols, routing and addressing are handled
here.
OSI Reference Model
• Layer 2: Data - In this layer, the appropriate
physical protocol is assigned to the data. Also,
the type of network and the packet sequencing
is defined.
• Layer 1: Physical - This is the level of the
actual hardware. It defines the physical
characteristics of the network such as
connections, voltage levels and timing.

The OSI Reference Model is really just a


guideline. Actual protocol stacks often
combine one or more of the OSI layers into a
single layer.
TCP/IP Model

 The TCP/IP architectural model has four layers


that approximately match six of the seven layers
in the OSI Reference Model. The TCP/IP model
does not address the physical layer, which is
where hardware devices reside. The next three
layers—network interface, internet and (host-to-
host) transport—correspond to layers 2, 3 and 4 of
the OSI model. The TCP/IP application layer
conceptually “blurs” the top three OSI layers.
TCP/IP Model
Protocol
A set of rules for sending information over a network.
Protocols can include rules concerning any or all of the
following functions:

• Data transmission mechanisms


• Communication session initialization and termination
• Addressing and routing
• Authentication and verification
• Encryption and compression
• Error correction

Protocols are usually classified according to the layer


they correspond to in the Open Systems Interconnection
(OSI) reference model for networking.
Protocol Stacks
A protocol stack is a group of protocols that all work
together to allow software or hardware to perform a
function. The TCP/IP protocol stack is a good example. It
uses four layers that map to the OSI model as follows:

• Layer 1: Network Interface - This layer combines the


Physical and Data layers and routes the data between
devices on the same network. It also manages the
exchange of data between the network and other
devices.
• Layer 2: Internet - This layer corresponds to the
Network layer. The Internet Protocol (IP) uses the
IP address, consisting of a Network Identifier and a
Host Identifier, to determine the address of the device it
is communicating with.
Protocol Stacks

 Layer 3: Transport - Corresponding to the OSI Transport


layer, this is the part of the protocol stack where the
Transport Control Protocol (TCP) can be found. TCP
works by asking another device on the network if it is
willing to accept information from the local device.
Protocols : UDP, TCP.
 Layer 4: Application - Layer 4 combines the Session,
Presentation and Application layers of the OSI model.
Protocols for specific functions such as e-mail (Simple
Mail Transfer Protocol, SMTP) and file transfer (File
Transfer Protocol, FTP) & HTTP reside at this level.
Protocols

 HTTP
 FTP
 SMTP
 TCP/IP
 UDP
 ARP
 ICMP
Checkpoint

Doubts till now???


Network Address

An identifier for a computer or device on


a TCP/IP network.

There are two types of addresses each


computer need to have if it needs to be
on the network:

(a) Physical Address (MAC address).


(b) Logical Address (IP Address).
MAC Address

Media Access Control (MAC) Address is a unique 6-


byte (48-bit) address that is usually permanently
burned into a network interface card (NIC) or
other physical-layer networking device and that
uniquely identifies the device on an Ethernet-
based network. A MAC address is also known as
an Ethernet address, hardware address, physical
address, or PHY address.

Every device and port that connects to an


Ethernet LAN requires a MAC address.
MAC Address

The uniqueness of MAC addresses is ensured by


the Institute of Electrical and Electronics Engineers
(IEEE), which assigns networking device vendors
specific blocks of MAC addresses for the devices
they produce. The first 3 bytes (24 bits) represent
the manufacturer of the card, and the last 3 bytes
(24 bits) identify the particular card from that
manufacturer. Each group of 3 bytes can be
represented by 6 hexadecimal digits, forming a 12-
digit hexadecimal number representing the entire
MAC address.
MAC Address

Examples of manufacturer 6-digit numbers


include the following:

 00000C (Cisco)
 00001D (Cabletron)
 0004AC (IBM [PCMCIA Ethernet adapter])
 0020AF (3Com)
 00C0A8 (GVC)
 080007 (Apple)
 080009 (Hewlett-Packard)
MAC Address

Some NICs come with a software utility that you can use to change
the MAC address of the card. Changing the address is not a good idea!
If you accidentally configure two network cards on your network to
have the same MAC address, address conflict problems will result and
the computers will not be able to communicate on the network.

To know MAC address of your computer’s NIC:


From the Windows 95 or Windows 98 Run dialog box: winipcfg
From the Windows NT/2000/XP/2003: command prompt:
ipconfig /all
IP Address

A 32-bit (for IPv4) logical address for a host on a


TCP/IP network. Each host on a TCP/IP network
needs a unique IP address for communication to
take place reliably on the network.

The format of an IP address is a 32-bit numeric


address written as four numbers separated by
periods. Each number can be zero to 255 (with
some restrictions). For example, 1.160.10.240 could
be an IP address.
IP Address
A typical IP address looks like this: 216.27.61.137

 To make it easy to remember, IP addresses are normally expressed in


decimal format as a "dotted decimal number" like the one above. But
computers communicate in binary form. Look at the same IP address in
binary:
11011000.00011011.00111101.10001001

 The four numbers in an IP address are called octets, because they each
have eight positions when viewed in binary form. If you add all the
positions together, you get 32, which is why IP addresses are considered
32-bit numbers. Since each of the eight positions can have two different
states (1 or 0) the total number of possible combinations per octet is 28 or
256. So each octet can contain any value between 0 and 255. Combine the
four octets and you get 232 or a possible 4,294,967,296 unique values!
Address Resolution Protocol (ARP)
• A TCP/IP network layer protocol responsible for
resolving IP addresses into MAC addresses.
• When a TCP/IP-aware application tries to access another
TCP/IP host using its IP address, the destination host’s
IP address must first be resolved into a MAC address so
that the frame can be addressed and placed on the wire
and then be recognized by the destination host’s
network interface card (NIC). This is because network
interface cards operate at the physical layer (layer 1) and
data-link layer (layer 2) of the Open Systems
Interconnection (OSI) reference model and must use
physical addresses (such as MAC addresses) instead of
logical addresses (such as IP addresses) for network
communication.
IP Address

 The IP address of a host is partitioned by


the network’s subnet mask into two parts,
a network ID and a host ID.

What is SUBNET MASK???


IP Address Classes

 Default Network - The IP address of 0.0.0.0 is used for


the default network.
 Class A - This class is for very large networks, such as a
major international company might have. IP addresses
with a first octet from 1 to 126 are part of this class. The
other three octets are used to identify each host. This
means that there are 126 Class A networks each with
16,777,214 (224 -2) possible hosts for a total of
2,147,483,648 (231) unique IP addresses. Class A networks
account for half of the total available IP addresses. In
Class A networks, the high order bit value (the very first
binary number) in the first octet is always 0.
Net Host or Node
115. 24.53.107
IP Address Classes

 Class B - Class B is used for medium-sized networks. A


good example is a large college campus. IP addresses
with a first octet from 128 to 191 are part of this class.
Class B addresses also include the second octet as part of
the Net identifier. The other two octets are used to
identify each host. This means that there are 16,384 (214)
Class B networks each with 65,534 (216 -2) possible hosts
for a total of 1,073,741,824 (230) unique IP addresses.
Class B networks make up a quarter of the total available
IP addresses. Class B networks have a first bit value of 1
and a second bit value of 0 in the first octet.
Net Host or Node
145.24. 53.107
IP Address Classes

 Class C - Class C addresses are commonly used for


small to mid-size businesses. IP addresses with a first
octet from 192 to 223 are part of this class. Class C
addresses also include the second and third octets as
part of the Net identifier. The last octet is used to
identify each host. This means that there are 2,097,152
(221) Class C networks each with 254 (28 -2) possible hosts
for a total of 536,870,912 (229) unique IP addresses. Class
C networks make up an eighth of the total available IP
addresses. Class C networks have a first bit value of 1,
second bit value of 1 and a third bit value of 0 in the first
octet.
Net Host or Node
195.24.53. 107
IP Address Classes

 Networks that are directly connected to the Internet must have their
IP addresses assigned by the Internet Network Information Center
(InterNIC) or some other authority. Businesses usually obtain these
addresses through their local Internet service provider (ISP).
However, firewall and proxy server combinations, which are
popular on today’s networks, hide a network’s IP addresses from
other hosts on the Internet. These private networks can use any IP
addresses they choose, although InterNIC recommends the
following IP address blocks for private networks:
 Class A networks: 10.x.y.z
 Class B networks:
172.16.y.z through 172.31.y.z
 Class C networks:
192.168.0.z through 192.168.254.z
APIPA

 Automatic Private IP Addressing: A feature of Microsoft


Windows, APIPA is a DHCP failover mechanism. With
APIPA, DHCP clients can obtain IP addresses when
DHCP servers are nonfunctional. APIPA exists in all
popular versions of Windows except Windows NT.
 When a DHCP server fails, APIPA allocates addresses in
the private range 169.254.0.1 to 169.254.255.254. Clients
verify their address is unique on the LAN using ARP.
 In APIPA, all devices use the default network mask
255.255.0.0 and all reside on the same subnet.
IP Address
Devices use IP addresses to communicate with the management station and to perform
routing tasks. Assign a unique IP address to each device in your network. Choose each
IP address from the range of addresses that are assigned to your organization

Gateway Address
The default gateway IP address identifies the gateway (for example, a router) that
receives and forwards those packets whose addresses are unknown to the local
network. The agent uses the default gateway address when sending alert packets to the
management workstation on a network other than the local network. Assign the gateway
address on each device
Subnet Mask
The subnet mask is a 32-bit number in the same format and representation as IP
addresses. The subnet mask determines which bits in the IP address are interpreted as
the network number, which as the sub-network number, and which as the host number.
Each IP address bit that corresponds to a 1 in the subnet mask is in the network / sub-
network part of the address. This group of numbers is also called the Network ID. Each
IP address bit that corresponds to a 0 is in the host part of the IP address.
The subnet mask is specific to each type of Internet class. The subnet mask must match
the subnet mask that you used when you configured your TCP/IP software.
IP Address

Note the following considerations for valid


IP addressing:
 The network ID cannot be 127.
 The network ID and host ID both cannot
be 255.
 The network ID and host ID cannot both
be 0.
 The host ID must be unique for a given
network ID.
Checkpoint

Doubts till now???


Gateway

 Gateways are essentially devices that


direct network traffic in some fashion and
translate that information.
 They are commonly used to provide
connectivity between two different
protocol stacks that might be running on
different systems.
Gateway

 A network gateway is an internetworking


system, a system that joins two networks
together. A network gateway can be
implemented completely in software, completely
in hardware, or as a combination of the two.
Depending on their implementation, network
gateways can operate at any level of the OSI
model from application protocols to low-level
signaling.
Router

 A networking device that is used to


extend or segment networks by
forwarding packets from one logical
network to another. Routers are most
often used in large internetworks that use
the TCP/IP protocol suite and for
connecting TCP/IP hosts and local area
networks (LANs) to the Internet using
dedicated leased lines.
Router

 Routers work at the network layer (layer


3) of the Open Systems Interconnection
(OSI) reference model for networking to
move packets between networks using
their logical addresses (which, in the case
of TCP/IP, are the IP addresses of
destination hosts on the network).
Firewall

 Any system or device that allows safe network traffic to


pass while restricting or denying unsafe traffic. Firewalls
are usually dedicated machines running at the gateway
point between your local network and the outside world,
and are used to control who has access to your private
corporate network from the outside—for example, over
the Internet. More generally, a firewall is any system that
controls communication between two networks.
 A firewall is essentially a kind of router or computer
with two network interface cards that filters incoming
network packets. This device is often called a packet-
filtering router.
Patch Cables

 A short cable, usually unshielded twisted-pair


(UTP) cabling, that connects a port on a patch
panel to a port on a hub or a switch. Patch cables
are usually terminated at both ends with RJ-45
connectors.

 Patch Cables are of two types:


 Parallel Cable: To connect 2 dissimilar devices,
 Cross Cable: To connect 2 similar devices.
Network Interface Cards

 An adapter card that plugs into the system bus


of a computer and allows the computer to send
and receive signals on a network. A network
interface card (NIC) is also known as a network
adapter card or simply a network card.
 NICs can have one or more connectors for
cabling to be attached, such as
 RJ-45 connector for twisted-pair cabling (the most
common type)
 BNC connector for thinnet cabling
 DB15 connector for connecting drop cables to thicknet
cabling.
Switch

 Any device that can control the flow of electrical


signals.
 In the context of controlling data flow within a
network, the term “switch” is also used to
describe a data-link layer device that routes
frames between connected networks.
 Local area network (LAN) switches: Used to
route Ethernet frames over a TCP/IP
internetwork; also called Ethernet switches
Hub

 Also called a repeater hub, the basic networking


component used in traditional 10-Mbps Ethernet
networks to connect network stations to form a local area
network (LAN). Hubs can be used for
 Connecting about a dozen computers to form a workgroup or
departmental LAN
 Connecting other hubs in a cascaded star topology to form a larger
LAN of up to roughly a hundred computers
 The hub receives signals from each station and
repeats the signals to all other stations
connected to the hub.
 Hubs thus perform the function of a repeater and are
sometimes called multiport repeaters.
 Work on Physical Layer.
 Stations wired into a hub form a star topology.
Checkpoint

Doubts till now???


Troubleshooting
&
Commands
Network Components

There are 4 components required in a


machine to be in a network:
 Adapter
 Client Service
 Protocol
 Service
Network Components

Adapter is the NIC, needed to physically connect


to the network.

Client service is used to access


server/resource on the network. Eg:Client
for Microsoft Networks, Client for NetWare
Networks.
Network Components

Protocol is a set of rules for sending information over a


network. Eg: TCP/IP, NetBEUI, IPX/SPX.

Service is background process in an os that provides some


specific functionality. Eg: Server service in Microsoft Windows NT
and Windows 2000 and File and Printer Sharing for Microsoft
Networks in Microsoft Windows 95 and Windows 98, both of
which enable sharing of resources over the network.
Network Components

 A Microsoft Windows 95, Windows 98, and Windows 2000


networking component that makes it possible to access file and
print services on Windows 95, Windows 98, Windows NT,
Windows 2000, Windows for Workgroups, and LAN Manager
dedicated servers and peer servers. Client for Microsoft Networks
works with any combination of NetBEUI, IPX/SPX-Compatible
Protocol, and TCP/IP protocols. Client for Microsoft Networks
cannot be used for accessing non-Microsoft servers such as Novell
NetWare servers. You must install Client for NetWare Networks to
access these servers. Windows 95 and Windows 98 allow you to
install more than one client at a time to access different kinds of
servers on the network.
 How It Works: Use the Network utility in Control Panel to install
Client for Microsoft Networks on a computer running Windows 95
or Windows 98. Then use the property sheet of Client for Microsoft
Networks to configure the computer to either participate in a
workgroup or log on to a Windows NT or Windows 2000 domain.
Commands

 PING
 IPCONFIG
 NBTSTAT
 REPAIR
 TRACERT
ping

 Stands for Packet Internet Groper, a TCP/IP utility that


verifies the integrity of a network connection with a host
on a TCP/IP network. The ping command is one of the
first commands to use to troubleshoot communication
problems on a TCP/IP network.

 The usual procedure for using ping to troubleshoot a


TCP/IP network follows:
 Verify that TCP/IP is installed and running by pinging the local
loopback address using ping 127.0.0.1.
 Ping your own IP address and host name.
 Ping the IP address of the default gateway for your local
network.
 Ping the IP address of a host on a remote network.
ipconfig

 Displays all current TCP/IP network


configuration values and refreshes Dynamic
Host Configuration Protocol (DHCP) and
Domain Name System (DNS) settings. Used
without parameters, ipconfig displays the IP
address, subnet mask, and default gateway for
all adapters.
 Syntax:
Ipconfig
ipconfig

 Parameters:
 /all : Displays the full TCP/IP configuration for all adapters.
Without this parameter, ipconfig displays only the IP address,
subnet mask, and default gateway values for each adapter.
Adapters can represent physical interfaces, such as installed
network adapters, or logical interfaces, such as dial-up
connections.
 /renew [Adapter] : Renews DHCP configuration for all adapters
(if an adapter is not specified) or for a specific adapter if the
Adapter parameter is included. This parameter is available only
on computers with adapters that are configured to obtain an IP
address automatically.
 /release [Adapter] : Sends a DHCPRELEASE message to the
DHCP server to release the current DHCP configuration and
discard the IP address configuration for either all adapters (if an
adapter is not specified) or for a specific adapter
ipconfig

 /flushdns : Flushes and resets the contents of the DNS client


resolver cache. During DNS troubleshooting, you can use this
procedure to discard negative cache entries from the cache, as
well as any other entries that have been added dynamically.
 /displaydns : Displays the contents of the DNS client resolver
cache, which includes both entries preloaded from the local
Hosts file and any recently obtained resource records for name
queries resolved by the computer.
 /registerdns : Initiates manual dynamic registration for the DNS
names and IP addresses that are configured at a computer. You
can use this parameter to troubleshoot a failed DNS name
registration or resolve a dynamic update problem between a
client and the DNS server without rebooting the client computer.
nbtstat

 A TCP/IP utility that displays current TCP/IP


connections and statistics using NetBIOS over
TCP/IP (NetBT). Nbtstat is installed on a
computer running Microsoft Windows when the
TCP/IP protocol stack is installed. You can run
nbtstat from the command prompt to view
NetBT statistics on the computer and determine
the status of connections formed to the machine.
nbtstat

 nbtstat -n shows the NetBIOS names of the host


that have been registered on the system.
 nbtstat -c displays the current contents of the
NetBIOS name cache, which contains NetBIOS
name to IP address mappings for other hosts on
the network.
 nbtstat -a < ComputerName > to obtain the local
NetBIOS name table on <ComputerName> and
its MAC address.
arp

 A TCP/IP utility and Microsoft Windows NT


command for viewing and modifying the local
Address Resolution Protocol (ARP) cache, which
contains recently resolved MAC addresses of
Internet Protocol (IP) hosts on the network.
When one host on a TCP/IP network wants to
communicate with a second host, the first host
begins by using the ARP to resolve the IP
address of the second host into its associated
MAC address. The MAC address is needed for
communication to take place over the network.
arp

 arp –a : displays arp cache


 arp -s : adds a static entry
repair
What actions are taken if you select the
Repair option on a local area network (LAN)
or high-speed Internet connection.

The following actions are taken if you select the Repair


option on a LAN or high-speed Internet connection.

(Right click on the ‘Local Area Connection’ & click on


“repair”)
tracert

 A TCP/IP utility in Microsoft Windows for


diagnosing and troubleshooting router
connections in an internetwork such as the
Internet. The term “tracert” stands for trace
route. The tracert utility uses Internet Control
Message Protocol (ICMP) echo packets that are
similar to those used by the ping utility. These
ICMP echo packets are assigned a steadily
increasing Time to Live (TTL) to test network
connectivity with routers and other hosts that
are farther and farther along the network path
until connectivity fails or the target host is
finally contacted and successfully responds.
Few Troubleshooting Steps

 Things like lan cable, port etc.


 Drivers.
 Check the IP Address, Subnet mask,
default gateway, DNS.
 Ping Loopback IP, Self IP, Gateway, then
ping Remote Machine.
 Disable firewalls & Norton internet
Security.
Checkpoint

Doubts till now???


THANKS

TIME FOR QUERIES

BE READY FOR A TEST VERY SOON 

You might also like