Sunteți pe pagina 1din 11

AHMED SHIMELS MUHE(18BCE2427)

8/10/19

NETWORK COMMAND AND DEVICES

Command Description Command line out put


1 I. The ping command is
Ping a Command Prompt
command used to test the
ability of the source computer
to reach a specified destination
computer.
II. The ping command is usually
used as a simple way to verify
that a computer can
communicate over Example:
the network with another ping www.vit.ac.in
computer or network device.
III. The ping command operates by
sending Internet Control
Message Protocol (ICMP) Echo
Request messages to the
destination computer and
waiting for a response.
IV. How many of those responses
are returned, and how long it
takes for them to return, are
the two major pieces of
information that the ping
command provides.
Syntax: ping ip Address or
hostname
Ping Command
Example:
ping 127.0.0.1
ping www.vit.ac.in
AHMED SHIMELS MUHE(18BCE2427)
8/10/19

NETWORK COMMAND AND DEVICES

2 netstat ▪ netstat (network statistics) is a


command line tool for
monitoring network
connections both incoming and
outgoing as well as viewing
routing tables, interface e.g.
statistics etc. netstat -a
▪ netstat is available on all Unix-
like Operating Systems and
also available on Windows
OS as well.
▪ It is very useful in terms of
network troubleshooting and
performance measurement.
▪ It is used to display the TCP/IP
network protocol statistics and
information.
e.g.
Netstat -a
Netstat -au
Netstat -at

3 ▪ tcpdump is a most powerful


Tcpdump and widely used command-line
packets sniffer or package
analyzer tool which is used to
capture or
filter TCP/IP packets that
received or transferred over a
network on a specific interface.
▪ It is available under most of
the Linux/Unix based
operating systems. tcpdump
also gives us a option to save
captured packets in a file for
future analysis.
AHMED SHIMELS MUHE(18BCE2427)
8/10/19

NETWORK COMMAND AND DEVICES

▪ It saves the file in


a pcap format, that can be
viewed by tcpdump command
or a open source GUI based
tool called Wireshark (Network
Protocol Analyzier) that reads
tcpdump pcap format files.
e.g.
tcpdump -i eth0

4 hostname ▪ hostname command in Linux is


used to obtain the
DNS(Domain Name System)
name and set the system’s
hostname or NIS(Network
Information System) domain
name.
▪ A hostname is a name which is
given to a computer and it
attached to the network. Its
main purpose is to uniquely
identify over a network.
Syntax :
hostname
AHMED SHIMELS MUHE(18BCE2427)
8/10/19

NETWORK COMMAND AND DEVICES

5 The tracert command is a Command


tracert Prompt command that's used to show
several details about the path that
a packet takes from the computer or
device you're on to whatever
destination you specify. e.g.
e.g. traceroute www.vit.ac.in
tracert 192.168.1.1
traceroute www.vit.ac.in

6 The finger command in Linux is


finger basically a user information lookup
program
Retrieves information about the
specified user.
e.g.
finger -p ch
AHMED SHIMELS MUHE(18BCE2427)
8/10/19

NETWORK COMMAND AND DEVICES

7 ipconfig This utility allows you to get the IP


address information of a Windows
computer. It also allows some control
over active TCP/IP connections.
Ipconfig replaced the older winipcfg
utility.
e.g.
Ipconfig /all
Ipconfig /?
Ipconfig /release
Ipconfig/renew
e.g.
Ipconfig /?
AHMED SHIMELS MUHE(18BCE2427)
8/10/19

NETWORK COMMAND AND DEVICES

dig ▪ Dig stands for (Domain


8 Information Groper) is a
network administration
command-line tool for
querying Domain Name
System (DNS) name servers
▪ The "domain information
groper" tool. If a hostname is
e.g.
given as an argument, it
dig google.com
outputs information about that
host, including it's IP address,
hostname and various other
information.
e.g.
dig yahoo.com
dig vitlinux
dig yahoo.com +short

telnet ▪ The telnet command is used


for interactive communication
9 with another host using the
TELNET protocol. It begins in
command mode, where it
prints a telnet
command prompt ("telnet>").
e.g.
telnet myhost.com
AHMED SHIMELS MUHE(18BCE2427)
8/10/19

NETWORK COMMAND AND DEVICES

10 FTP FTP is the simplest and most familiar


file transfer protocol that exchanges
files between a local and remote
computer.
Linux and Unix operating
systems have built-in command
line prompts you can use as FTP
clients for making an FTP connection.
e.g
ftp 192.168.0.15
ftp abc.xyz.edu

11 ▪ Nslookup network utility


nslookup program used to obtain
information about internet
servers. It finds name server
information for domains by
querying the Domain Name
System.
e.g
nslookup www.vit.ac.in
e.g.
nslookpup www.google.com
nslookup www.vit.ac.in
AHMED SHIMELS MUHE(18BCE2427)
8/10/19

NETWORK COMMAND AND DEVICES

12 ROUTE ▪ command also shows and


manipulate ip routing table.
▪ route command is used to view
and make changes to
the kernel routing table.
e.g.
route -n
AHMED SHIMELS MUHE(18BCE2427)
8/10/19

NETWORK COMMAND AND DEVICES

Network devices
s.no Name Description Image
1 Hubs connect multiple computer
networking devices together.

A hub also acts as a repeater in that it


• Hub amplifies signals that deteriorate after
traveling long distances over
connecting cables.

A hub is the simplest in the family of


network connecting devices because it
connects LAN components with
identical protocols.

2 ▪ A switch is a multiport device


that improves network
efficiency.

• Switch ▪ The switch maintains limited


routing information about
nodes in the internal network,
and it allows connections to
systems like hubs or routers.

▪ Strands of LANs are usually


connected using switches.
Generally, switches can read
the hardware addresses of
incoming packets to transmit
them to the appropriate
destination.
AHMED SHIMELS MUHE(18BCE2427)
8/10/19

NETWORK COMMAND AND DEVICES

3 Routers help transmit packets to their


destinations by charting a path
• Router through the sea of interconnected
networking devices using different

network topologies. Routers are


intelligent devices, and they store
information about the networks
they’re connected too.

4 • Bridge Bridges are used to connect two or


more hosts or network segments
together.

The basic role of bridges in network


architecture is storing and forwarding
frames between the different segments
that the bridge connects

5 Gateways normally work at the


Transport and Session layers of the
• Gateway OSI model. At the Transport layer and
above, there are numerous protocols
and standards from different vendors;
gateways are used to deal with them.

Gateways provide translation between


networking technologies such as Open
System Interconnection (OSI) and
Transmission Control
Protocol/Internet Protocol (TCP/IP)
AHMED SHIMELS MUHE(18BCE2427)
8/10/19

NETWORK COMMAND AND DEVICES

6 Modems (modulators-demodulators)
are used to transmit digital signals
• Modem over analog telephone lines.

digital signals are converted by the


modem into analog signals of
different frequencies and transmitted
to a modem at the receiving location.

7 A repeater is an electronic device that


amplifies the signal it receives.
• Repeater
You can think of repeater as a device
which receives a signal and
retransmits it at a higher level or
higher power so that the signal can
cover longer distances, more than 100
meters for standard LAN cables.
Repeaters work on the Physical layer.

8 • Access While an access point (AP) can


Point technically involve either a wired or
wireless connection, it commonly
means a wireless device.

An AP works at the second OSI layer,


the Data Link layer, and it can operate
either as a bridge connecting a
standard wired network to wireless
devices or as a router passing data
transmissions from one access point
to another.

S-ar putea să vă placă și