0% found this document useful (0 votes)
9 views41 pages

Networking Commands

The document outlines basic networking commands and concepts, including how to retrieve MAC addresses, use the ping command for connectivity testing, and the functions of networking devices like hubs, switches, and routers. It explains the importance of IP addressing, firewalls, and NAT in network communication and security. Additionally, it describes different network topologies, specifically focusing on star topology with switches and hubs.

Uploaded by

abhaysinha9991
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views41 pages

Networking Commands

The document outlines basic networking commands and concepts, including how to retrieve MAC addresses, use the ping command for connectivity testing, and the functions of networking devices like hubs, switches, and routers. It explains the importance of IP addressing, firewalls, and NAT in network communication and security. Additionally, it describes different network topologies, specifically focusing on star topology with switches and hubs.

Uploaded by

abhaysinha9991
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 41

basic networking commands

• To know the MAC address of the system


• >getmac
>Ipconfig
• it provides the network adapter information such as IP address,
subnet mask, and default gateway.
• Mac address, and dns servers(192.168.23.21,192.168.23.22)
ipconfig
Powershell in windows
>Get-NetAdapter :
• command in PowerShell is used to retrieve information about the
network adapters (interfaces) on your computer. When you run this
command, it provides details about the network interfaces, such as
your Ethernet or Wi-Fi connections.
•The Name shows the type of network adapter (Ethernet or Wi-Fi).
•Status tells you if the adapter is active (Up) or disabled.
•LinkSpeed indicates the maximum speed at which the adapter can transfer data.
•MAC Address is the unique hardware address of the network adapter.
• Megabits per second(mbps)
• Mbps measures the speed of data transfer in a network, such as
internet speed or how quickly data is being sent or received.
• 1 Byte = 8 bits.
• 1 MB (Megabyte) = 8 Mbps (because 1 MB = 8 Megabits).
• So, if your internet speed is 100 Mbps, it means you can download or
upload 100 million bits of data every second.
ping
• Ping command in Windows (and other operating systems) is used to
test the connectivity between your computer and another network
device (such as another computer, a server, or a website).
• It checks if the target device is reachable and measures the round-trip
time it takes for a small packet of data to travel from your computer
to the target and back.

• Synatax: ping [hostname or IP address]


Ping
• Common Use Cases of the ping command
• Checking Network Connectivity:
• Purpose: To verify whether your computer can reach another device
or server on the network or the internet.
• Example: To check if your computer can reach Google's DNS server,
you would use:
• Ping ip address
• Testing Internet Access:
• Purpose: To confirm if you have an active internet connection.
• Example: You can ping an external website, like Google
• ping google.com
A successful ping means your
device is connected to the internet.
• Diagnosing Network Problems:
• Purpose: Helps diagnose network issues such as whether a specific
server or device is down or unreachable.
• Example: If you cannot access a website, you can ping the website’s IP
address or domain name. If you get no reply or a "Request Timed
Out" message, it suggests the network might be down or there's an
issue with the route.
Key Information in Ping Output:
1.IP Address: The address you're pinging (e.g., 216.58.213.78).
2.Bytes: The size of the data packet sent (usually 32 bytes).
3.Time: The round-trip time for the packet in milliseconds (ms). A lower time means faster response.
4.TTL (Time-to-Live): The number of hops the packet takes to reach the destination.
5. It shows how far the packet has traveled.

Possible Ping Results:


•Reply from [IP address]: Indicates successful communication between your computer and the destination device.
•Request Timed Out: Suggests that no response was received within the timeout period (typically 4 seconds).
•This could indicate a network issue or that the target device is unreachable.
•Destination Host Unreachable: The target device is not reachable from your network
•(could be due to a configuration issue or physical network failure).
• Testing Local Network Connections:
• Purpose: To test if your computer can communicate with another
device on the same local network (LAN).
• Example: If you want to check if your computer can reach another
computer on your local network, you can ping its IP address.
>ping 192.168.1.10
• In our lab, we are using star topology.
• Here we are switch no: 2960
• 24 systems connected.
• Here 3 switches: each can connect 24 systems.
Hub

Function: A hub is a simple networking device that connects multiple


devices in a local area network (LAN).
 It acts as a central point through which data packets are sent to all devices
connected to it.
How it Works: Hubs operate at the Physical Layer (Layer 1) of the OSI
model.
When data is sent to the hub, it broadcasts that data to every device on the
network (no matter the destination).
Example: If you send a message from one computer, the hub sends that
message to all other connected computers, even if the message is not
intended for them
Importance: Hubs are inexpensive but inefficient because they
broadcast all traffic to all devices, which can cause network
congestion.
They are rarely used in modern networks.
Switch

Function: A switch is a more intelligent device compared to a hub. It


connects multiple devices within a LAN and forwards data only to the
device it is intended for.
How it Works: Switches operate at the Data Link Layer (Layer 2) of
the OSI model.
They keep a MAC address table to map the MAC addresses of
devices.
When data is received, it checks the MAC address and sends the data
only to the device with that address.
Example: If Computer A sends data to Computer B, the switch will
only send that data to Computer B instead of all devices on the
network like a hub.
Importance: Switches are more efficient than hubs and reduce
network traffic, as they minimize the number of devices that receive
unnecessary data.
They are the backbone of modern LANs.
3. Router

Function: A router connects different networks (typically different IP


subnets) and determines the best path for data to travel across the
networks.
It is responsible for forwarding data between devices on different
networks, like between your local network and the Internet.
How it Works: Routers operate at the Network Layer (Layer 3) of the
OSI model.
They use IP addresses to route data packets and typically have routing
tables to determine the best path for data to reach its destination.
Example: When you access a website, your router sends the data
from your local network to your Internet Service Provider (ISP), which
forwards it to the destination server.
Importance: Routers are crucial for connecting different networks
(e.g., your home network to the Internet).
They also help manage IP addressing and can provide security
features like firewalling and NAT (Network Address Translation).
Device Function OSI Layer Data Handling Importance
Simple, inexpensive,
Connects multiple Physical Layer (Layer Broadcasts data to
Hub but inefficient.
devices in a network 1) all devices
Rarely used today.
More efficient than
Connects devices
Forwards data a hub; reduces
within a LAN, Data Link Layer
Switch based on MAC congestion.
forwards data (Layer 2)
addresses Standard in modern
intelligently
LANs.
Essential for
Connects different Forwards data network
Network Layer
Router networks (e.g., LAN based on IP interconnection and
(Layer 3)
to Internet) addresses routing between
different networks.
Importance of Each Device:

• Hub: Used for basic connectivity in small or old networks, though it's
inefficient. It's now largely obsolete in favor of switches.
• Switch: Central to modern networking, providing efficient and reliable
communication between devices within a local network.
• Router: Critical for inter-network communication, such as connecting
a local network to the Internet and managing traffic between
different IP networks.
• IP Addressing
• IP Addressing refers to the system of assigning unique numerical
addresses to every device connected to a network (like your
computer, smartphone, or a printer).
• An IP address acts like a "home address" for a device on a network.
Just like a letter is sent to a specific home address, data is sent to a
device using its IP address.
• Example: When you visit a website, your device sends a request to the web
server using its IP address. The server then responds by sending the data
back to your device’s IP address.
• Why is it Important?
• IP addresses allow devices to find and communicate with each other
on the network, ensuring that data gets sent to the correct place.
• 2. Firewalling
• A firewall is a security feature that acts like a barrier between your
local network (like your home or office network) and the outside
world (like the internet). It controls the flow of data, allowing or
blocking it based on security rules.
• Think of a firewall as a security guard: It checks the data (like a
security guard checking bags at the entrance) to decide whether it’s
safe to let it pass or whether it should be blocked.
• How It Works:
• The firewall monitors incoming and outgoing traffic and makes
decisions based on certain rules (like only allowing traffic from trusted
sources).
• Example: If you are browsing the web, the firewall might block any
unauthorized access attempts or malicious data from coming into your
network (e.g., hackers trying to break into your computer).
• Why is it Important?
• A firewall helps protect your network and devices from threats like
hackers, viruses, and unwanted connections.
• 3. NAT (Network Address Translation)
• NAT (Network Address Translation) is a technique used by routers to hide the
private IP addresses of devices in your local network when they communicate
with the internet. It translates between private IP addresses (used within your
home or company network) and public IP addresses (used on the internet).
• Think of NAT as a receptionist: Inside an office (your local network), everyone
has a unique office number (private IP address). But, when they call someone
outside the office (internet), the receptionist (router) makes the call using the
company’s main phone number (public IP address). The receptionist keeps track
of which internal office number made which call, so when the outside person
replies, the receptionist can forward the response to the correct person inside.
• How It Works:
• Private IP Address: This is the address used by devices inside your
local network (e.g., 192.168.x.x). It’s not directly visible on the
internet.
• Public IP Address: This is the address that the outside world (e.g.,
websites) sees. It’s used by the router to communicate with the
internet.
• When your device communicates with the internet, the router:
1.Changes the private IP address to the public IP address.
2.Keeps a record so that when the server responds, the router knows
which internal device to send the data back to.
• Why is it Important?
• Conservation of IP addresses: There are limited public IP addresses,
so NAT allows many devices to share a single public IP address (by
assigning each device a unique private address).
• Security: NAT hides the internal network’s structure from the outside
world, which adds an extra layer of security because external devices
cannot directly access your private devices.
• Summary of Key Points:
• IP Addressing: Assigns unique addresses to devices so they can
communicate over the network.
• Firewalling: Protects your network by controlling which data is
allowed in and out, acting like a security guard.
• NAT (Network Address Translation): Hides private IP addresses within
your network and uses a single public IP address for communication
with the internet, improving security and saving IP addresses.
Topology
• Star
• Bus
• Ring
• Mesh
• Ring
• Hybrid
• Install cisco packet tracer.
Star topology with switch
Star topology with HUB

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy