Академический Документы
Профессиональный Документы
Культура Документы
Information sharing
Resources Sharing
Application Sharing
Homegroup is a group of two or more computers those are setup for easy file sharing.
Homegroup setup wizard gives us a password. Other users in network require this password to
join the homegroup. When a new computer joins the network, homegroup automatically share
following folders.
Folder Name
My Pictures
Public Pictures
My Music
My Videos
Public Videos
Path
%Username%\Pictures
%Public%\Pictures
%Username%\Pictures
%Username%\Pictures
%Public%\Pictures
Permission
Read
Read/Write
Read
Read
Read/Write
Low cost editions can join the home group, but they cannot create new one.
To use a workgroup computer you need to have a user account on that computer.
Homegroup
If your network has all computers lower than windows 7 then you should use workgroup.
But if you have windows 7 or higher version then you should always use homegroup to take
the advantage of new features. In a mix environment you can use both workgroup and
homegroup.
Describe Various Network Types
Local Area Networks Local area networks (LANs) are used to connect
networking devices that are in a very close geographic area, such as a floor
of a building, a building itself, or a campus environment.
Wide Area Networks Wide area networks (WANs) are used to connect LANs
together. Typically, WANs are used when the LANs that must be connected
are separated by a large distance.
Advantage
Performance is fast.
Availability is high because of the redundancy features available.
Distances can span up to 10 kilometers.
Management is easy because of the centralization of data resources.
Overhead is low (uses a thin protocol).
Disadvantage of SANs is their cost.
One of two sublayers of the data link layer of OSI reference model, as
defined by the IEEE 802 standard. This sublayer is responsible for
maintaining the link between computers when they are sending data across
the physical network connection.
Why should you care about the OSI Reference Model?
Routable protocols can work with a router and can be used to build large
networks. Non-Routable protocols are designed to work on small, local
networks and cannot be used with a router
What is MAU?
In a Ethernet network, between any two points on the network, there can be
no more than five network segments or four repeaters, and of those five
segments only three of segments can be populated.
What is the difference between TFTP and FTP application layer protocols?
The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from
a remote host but does not provide reliability or security. It uses the
fundamental packet delivery services offered by UDP.
The File Transfer Protocol (FTP) is the standard mechanism provided by TCP /
IP for copying a file from one host to another. It uses the services offered by
TCP and so is reliable and secure. It establishes two connections (virtual
circuits) between the hosts, one for data transfer and another for control
information.
What is the minimum and maximum length of the header in the TCP segment
and IP datagram?
The header should have a minimum length of 20 bytes and can have a
maximum length of 60 bytes.
What is difference between ARP and RARP?
What is Bandwidth?
Every line has an upper limit and a lower limit on the frequency of signals it
can carry. This limited range is called the bandwidth.
Difference between bit rate and baud rate.
Bit rate is the number of bits transmitted during one second whereas baud
rate refers to the number of signal units per second that are required to
represent those bits.
Baud rate = bit rate / N
Where N is no-of-bits represented by each signal shift.
What is MAC address ?
The address for a device as it is identified at the Media Access Control (MAC)
layer in the network architecture. MAC address is usually stored in ROM on
the network adapter card and is unique.
What is attenuation?
A method for providing fault tolerance by using multiple hard disk drives.
What is NETBIOS and NETBEUI?
What is Beaconing?
The process that allows a network to self-repair networks problems. The
stations on the network notify the other stations on the ring when they are
not receiving the transmissions. Beaconing is used in Token ring and FDDI
networks.
IP address is short for Internet Protocol (IP) address. An IP address is an identifier for a
computer or device on a TCP/IP network. Networks using the TCP/IP protocol route messages
based on the IP address of the destination. Contrast with IP, which specifies the format of
packets, also called datagrams, and the addressing scheme.
What is My IP Address?
To view your IP address you can use the ipconfig (IPCONFIG) command line tool. Ipconfig
displays all current TCP/IP network configuration values and refreshes Dynamic Host
Configuration Protocol (DHCP) and Domain Name System (DNS) settings.
To launch the command prompt from a Windows-based computer click: Start > All Programs >
Accessories > Command Prompt. Type ipconfig and press the Enter key.
You can also use Google search to find your IP address. Type "what is my IP address" as a search
query and Google will show the IP address of the computer from which the query was received
as the top search result.
Subnet mask is a mask used to determine what subnet an IP address belongs to. An IP address
has two components, the network address and the host address. For example, consider the IP
address 150.215.017.009. Assuming this is part of a Class B network, the first two numbers
(150.215) represent the Class B network address, and the second two numbers (017.009) identify
a particular host on this network.
What is Subnetting?
Subnetting enables the network administrator to further divide the host part of the address into
two or more subnets. In this case, a part of the host address is reserved to identify the particular
subnet. This is easier to see if we show the IP address in binary format.
The full address is:
10010110.11010111.00010001.00001001
The Class B network part is:
10010110.11010111
The host address is:
00010001.00001001
If this network is divided into 14 subnets, however, then the first 4 bits of the host address (0001)
are reserved for identifying the subnet.
The subnet mask is the network address plus the bits reserved for identifying the subnetwork -by convention, the bits for the network address are all set to 1, though it would also work if the
bits were set exactly as in the network address. In this case, therefore, the subnet mask would be
11111111.11111111.11110000.00000000. It's called a mask because it can be used to identify the
subnet to which an IP address belongs by performing a bitwise AND operation on the mask and
the IP address. The result is the subnetwork address:
Subnet Mask
255.255.240.000
11111111.11111111.11110000.000000
00
IP Address
150.215.017.009
10010110.11010111.00010001.000010
01
Subnet Address
150.215.016.000
10010110.11010111.00010000.000000
00
Subnet Calculator
An IP subnet mask calculator is used to automatically calculate subnets. The calculator allows
you to input an IP address and choose the Subnet Mask, Network class and other variables to
calculate subnet network mask. Results of the calculation will provide the hexadecimal IP
address, the wildcard mask, subnet ID, broadcast address and the subnet address range for the
resulting subnet network.
BOOTP helps a diskless workstation boot. How does it get a message to the
network looking for its IP address and the location of its operating system
boot files?
BOOTP sends a UDP message with a subnet work broadcast address and
waits for a reply from a server that gives it the IP address. The same
message might contain the name of the machine that has the boot files on it.
If the boot image location is not specified, the workstation sends another
UDP message to query the server.
What is a DNS resource record?
DNS uses UDP for communication between servers. It is a better choice than
TCP because of the improved speed a connectionless protocol offers. Of
course, transmission reliability suffers with UDP.
What is the difference between interior and exterior neighbor gateways?
The three types of routing tables are fixed, dynamic, and fixed central.
A fixed table must be manually modified every time there is a change.
A dynamic table changes its information based on network traffic, reducing
the amount of manual maintenance.
A fixed central table lets a manager modify only one table, which is then
read by other devices. The fixed central table reduces the need to update
each machine's table, as with the fixed table. Usually a dynamic table causes
the fewest problems for a network administrator, although the table's
contents can change without the administrator being aware of the change.
It is using a router to answer ARP requests. This will be done when the
originating host believes that a destination is local, when in fact is lies
beyond router.
What is OSPF?
It is an Internet routing protocol that scales well, can route traffic along
multiple paths, and uses knowledge of an Internet's topology to make
accurate routing decisions.
What is Kerberos?
It is a host that has a multiple network interfaces and that requires multiple
IP addresses is called as a Multihomed Host.
What is NVT (Network Virtual Terminal)?
It is a set of rules defining a very simple virtual terminal interaction. The NVT
is used in the start of a Telnet session.
What is Gateway-to-Gateway protocol?
It is a protocol used to advertise the set of networks that can be reached with
in an autonomous system. BGP enables this information to be shared with
the autonomous system. This is newer than EGP (Exterior Gateway Protocol).
What is autonomous system?
It is a problem that can ruin TCP performance. This problem occurs when
data are passed to the sending TCP entity in large blocks, but an interactive
application on the receiving side reads 1 byte at a time.
What is region?
When hierarchical routing is used, the routers are divided into what we call
regions, with each router knowing all the details about how to route packets
to destinations within its own region, but knowing nothing about the internal
structure of other regions.
What is multicast routing?
One of the main causes of congestion is that traffic is often busy. If hosts
could be made to transmit at a uniform rate, congestion would be less
common. Another open loop method to help manage congestion is forcing
the packet to be transmitted at a more predictable rate. This is called traffic
shaping.
What is packet filter?
Packet filter is a standard router equipped with some extra functionality. The
extra functionality allows every incoming or outgoing packet to be inspected.
Packets meeting some criterion are forwarded normally. Those that fail the
test are dropped.
When were OSI model developed and why its standard called 802.XX and so
on?
OSI model was developed in February1980 that why these also known as
802.XX Standard (Notice 80 means ==> 1980, 2means ==> February)
What is Full form of ADS?
If you have not activated windows XP, you can do so at any time by clicking
the windows Activation icon in the system tray to initiate activation. Once
you have activated windows XP, this icon disappears from the system tray.
For registration
Start ==> Run ==> regwiz /r
Where do we use cross and standard cable?
In computer it's known as com port and could be available in 9pin or 25 pin.
On router it have 60 pins.
How will check ip address on 98?
My computer ==> right click ==> manage ==> disk management ==>
select free space ==> right click ==> New partition
What is IP?
Three ranges of IP addresses have been reserved for private address and
they are not valid for use on the Internet. If you want to access internet with
these address you must have to use proxy server or NAT server (on normal
cases the role of proxy server is played by your ISP.).If you do decide to
implement a private IP address range, you can use IP addresses from any of
the following classes:
Class A 10.0.0.0 10.255.255.255
Class B 172.16.0.0 172.31.255.255
Class C 192.16.8.0.0 192.168.255.255
What is public IP address?
An FQDN contains (fully qualified domain name) both the hostname and a
domain name. It uniquely identifies a host within a DNS hierarchy
What is the DNS forwarder?
DNS servers often must communicate with DNS servers outside of the local
network. A forwarder is an entry that is used when a DNS server receives
DNS queries that it cannot resolve locally. It then forwards those requests to
external DNS servers for resolution.
Which command will you use to find out the name of the pc in networks?
NSLOOKUP [192.168.0.1]
[Ip of target computer]
How will enable sound service in 2003?
Install local printer on that pc which has physically attached printer. And then
Right click on it ==> share ==> In xp if you run small office set wizard it will
be share automatically. On all other PC install network printer. While
installing printer choose network printer.
How will you configure broadband ?
One that required user name and password to connect the internet like BSNL
or Reliance for this type of connection Physical installation of modem ==>
my network place ==> properties ==> Make new connection ==> next
==> connection to internet ==> setup my connection manually ==>
Connect using a broadband connection that requires a user name and
password ==> ISP name ==> User name and password ==> add a short
cut to desktop
If you are using other type of connection like Airtel for this type of connection
you don't required any additional configuration
If DHCP is enable in modem
IP address and DNS setting will be automatically configure.
If DHCP is not enable then set it manually as given ip by provider
What is minimum requirement of RAM for installation of XP?
64 MB
What is firewall?
The primary method for keeping a computer secure from unauthorized user.
A firewall allows or blocks traffic into and out of a private network or the
user's computer. Firewalls are widely used to give users secure access to the
Internet as well as to separate a company's public Web server from its
internal network.
XP pack 2 has a built in firewall that is enabled by default. To change the
setting of it use this path
Local area network ==> properties ==> advance ==> setting
What is Active Directory?
Active Directory is a network-based object store and service that locates and
manages resources, and makes these resources available to authorized users
and groups. An underlying principle of the Active Directory is that everything
is considered an objectpeople, servers, workstations, printers, documents,
and devices. Each object has certain attributes and its own security access
control list (ACL).
Workers are not able to print from the printer, there user logon are correct
and are allowed to print from that printer in active directory. How would you
resolve this issue?
Where are the Windows NT Primary Domain Controller (PDC) and its Backup
Domain Controller (BDC) in Server 2003?
The scheme of PDC and BDC is replaced by The Active Directory in server
2000 and further. Now all domain controllers share a multi master peer-topeer read and write relationship that hosts copies of the Active Directory.
How can group policy be refreshed?
What is LILO?
LILO stands for Linux boot loader. It will load the MBR, master boot record,
into the memory, and tell the system which partition and hard drive to boot
from.
I can't seem to access the Internet, don't have any access to the corporate
network and on IP configuration on my address is 169.254.*.*. What
happened?
Domain local groups assign access permissions to domain groups for local
domain resources. Global groups provide access to resources in entire
domains.
What's the major difference between FAT and NTFS on a local machine?
FAT and FAT32 provide no security over locally logged-on users. Only native
NTFS provides extensive permission control on both remote and local files.
What is presentation layer and how it is responsible for in the OSI model?
The presentation layer establishes the data format prior to passing it along to
the network application's interface. TCP/IP networks perform this task at the
application layer
the receiving computer reassembles them back into original data. This is the
basis for a packet-switching network.
TIA/EIA-568-B
Describe UTP cable
Cat 1 :- Used for voice-grade telephone networks only; not for data
transmissions
Cat 2 :- Used for voice-grade telephone networks
Cat 3 :-Used for voice-grade telephone networks, 10 Mbps Ethernet, 4
Mbps Token Ring,
Cat 4 :-Used for 16 Mbps Token Ring networks
Cat 5 :-Used for 100BaseTX Fast Ethernet, SONet, and OC-3 ATM
What is TIA/EIA?
Crossover cables should by used when you connect a DTE to another DTE or
a DCE to another DCE.
AUI( Attachment Unit Interface.) is the part of the Ethernet standard that
specifies how a Thicknet cable is to be connected to an Ethernet card. AUI
specifies a coaxial cable connected to a transceiver that plugs into a 15-pin
socket on the network interface card (NIC).
BNC stand for British Naval Connector (or Bayonet Nut Connector or Bayonet
Neill Concelman)a type of connector used with coaxial cables such as RG58.BNC connectors are used on both Thicknet and Thinnet.
What is protocol?
A set of standards that define all operations within a network. There are
various protocols that operate at various levels of the OSI network model
such as transport protocols include TCP.
Who develop the OSI modal?
What are the port number / socket number and Connection Multiplexing?
Transport layer assigns a unique set of numbers for each connection. These
numbers are called port or socket numbers TCP, and UDP, provide a
multiplexing function for a device: This allows multiple applications to
simultaneously send and receive data.
hidden or administrative shares are share names with a dollar sign ($)
appended to their names. Administrative shares are usually created
automatically for the root of each drive letter. They do not display in the
network browse list.
Name of seven layers in Open System Interconnection model.
Clients and Servers are separate logical entities that work together over a
network to accomplish a task. Many systems with very different architectures
that are connected together are also called Client/Server.
What is MAC address?
It is the 48 bit hardware address of LAN card. MAC address is usually stored
in ROM on the network adapter card and it is unique.
What are the perquisites to configure server?
Ping 127.0.0.1
If getting reply its fine
What are the difference between DOMAIN and WORKGROUP?
ipconfig
Which set wizard will run to do peer to peer networking in XP?
Ping
What is map drive?
Most large businesses, organizations, and universities these days use a proxy
server. This is a server that all computers on the local network have to go
through before accessing information on the Internet. By using a proxy
server, an organization can improve the network performance and filter what
users connected to the network can access.
Which folder contains ADS installed on server?
NTDS
What is the full form of Internet?
International Networking
Which are the bootable files of 98 and XP ?
In windows98 it is command.com
In XP it is NTLDR
In which partition Linux is installed ?.
Linux doesnt support windows file system that contain partition scheme. It
(Linux) has its own file system known as ext2, and ext3. it will install only on
it.In linux file system it will install on / (root) partition.
What is size of SWAP ?
Its the hard disk space that is used as RAM for fast processing. In window its
known as virtual memory and could be set as per retirement via this path
My Computer ==> properties ==> advance
In Linux its known as SWAP space and generally taken the double size of
physical RAM For example if you have 256 (MB) DDR physical ram then swap
space would be 512 MB.
What is full form of C.M.O.S ?
Subnet mask is a 4 byte (32 bit) number used to identify the sub-network ID
and the host ID from an IP address. All the hosts in a sub-network will have
the same subnet mask. E.g. 255.255.255.0, 255.255.127.0, 255.255.0.0
How many times computer reboot when server 2000 install?
2 times.
How will you remove this error ntldr missing press any key to reboot the
system ?
There are lots of advantages from build up a network, but the three big facts
areFile Sharing
From sharing files you can view, modify, and copy files stored on a different
computer on the network just as easily as if they were stored on your
computer.
Resource Sharing
Resources such as printers, fax machines, Storage Devices (HDD, FDD and
CD Drives), Webcam, Scanners, Modem and many more devices can be
shared.
Program Sharing
Just as you can share files on a network, you can often also share program on
a network. For example, if you have the right type of software license, you
can have a shared copy of Microsoft Office, or some other program, and keep
it on the network server, from where it is also run
What is network?
NTFS
What is networking?
How to find what program used as default for opening file .xyz ?
In cmd type C:\> assoc .xyz which program will open that .xyz file
How to change settings in command prompt?
The first thing you'll want to do is Start, Run, cmd.exe, then right click the
window menu and choose properties. Try the following values for
improvement:
Options | Command History | Buffer Size | 400
Options | Command History | Discard Old Duplicates | True
Options | Edit Options | QuickEdit Mode | True
Layout | Screen buffer size | Height | 900
Layout | Window size | Height | 40
How to start DirectX Diagnostic Tool ?
To start the DirectX Diagnostic Tool: 1. Click Start, and then click Run.
In the Open box, type dxdiag and then click OK.
How to determine whether there is an issue with the DNS configuration of
your connection to your ISP?
At a command prompt, type ipconfig /all and then press ENTER to display the
IP address of your DNS server. If the IP address for your DNS server does not
appear, you need contact your ISP.
What do you need to do that your browser will point URL www.example.com
to the internal IP address 127.99.11.01?
FTP is short for File Transfer Protocol. This is the protocol used for file transfer
over the Internet.
How will you make XP home the client of server 2003?
XP home edition is made only for home purpose so we cant use it as the
client. And same rule apply on windows vista editions also.
Where do you take back up from?
Click Start, point to All Programs, point to Accessories, point to System Tools,
and then click Backup.
Bedside's it?
If OS support then Select Drive ==> properties ==> back up now
What is router?
On Server
Configure ADS (for example its configured with xyz.com)
On Client
Log in form local administrator account
My Computer ==> Properties ==> Computer Name ==> Change
==>Domain ==>xyz.com ==> username Administrator (of xyz.com)
Password xxxxxxxxxxx (of admin of xyz.com)
Not every time but you are required a properly configured user account in
domain controller security policy.
ISO stand for?
To configure it on Server
Configure your server ==>Add/Remove a role ==>DHCP server
==>complete the wizard
Start ==> Administrative tools ==> DHCP ==>New scope ==> Wizard
Now authorized this server and do activate it
On client
Local area network ==> tcp/ip ==> obtain ip automatically
Obtain DNS automatically
When were OSI model developed and why its standard called 802.XX and so
on?
OSI model was developed in February1980 that why these also known as
802.XX Standard (Notice 80 means ==> 1980, 2means ==> February)
What is Full form of ADS?
If you have not activated windows XP, you can do so at any time by clicking
the windows Activation icon in the system tray to initiate activation. Once
you have activated windows XP, this icon disappears from the system tray.
For registration
Start ==> Run ==> regwiz /r
Where do we use cross and standard cable?
In computer it's known as com port and could be available in 9pin or 25 pin.
On router it have 60 pins.
How will check ip address on 98?
My computer ==> right click ==> manage ==> disk management ==>
select free space ==> right click ==> New partition
What is IP?
Three ranges of IP addresses have been reserved for private address and
they are not valid for use on the Internet. If you want to access internet with
these address you must have to use proxy server or NAT server (on normal
cases the role of proxy server is played by your ISP.).If you do decide to
implement a private IP address range, you can use IP addresses from any of
the following classes:
Class A 10.0.0.0 10.255.255.255
Class B 172.16.0.0 172.31.255.255
Class C 192.168.0.0 192.168.255.255
What is public IP address?
An FQDN contains (fully qualified domain name) both the hostname and a
domain name. It uniquely identifies a host within a DNS hierarchy
What is the DNS forwarder?
DNS servers often must communicate with DNS servers outside of the local
network. A forwarder is an entry that is used when a DNS server receives
DNS queries that it cannot resolve locally. It then forwards those requests to
external DNS servers for resolution.
Which command will you use to find out the name of the pc in networks?
NSLOOKUP [192.168.0.1]
[Ip of target computer]
How will enable sound service in 2003?
Hub is a layer 1 device. It will out the signal from all of its port except the
one from where its insert. It is unable to detect the collision. It works on
single collision and single broadcast domain.
Switch is layer 2 device. It maintains a CAM table that store the MAC address
of devices attached on its port. CAM table is used to make the forwarding
decision. It works on per port collision and single broadcast domain.
What is layer?
It is combination of two protocols TCP and IP. It is used for reliable data
transfer.
What is operating system?
In a ring topology, device one connects to device two, device two connects
to device three, and so on to the last device, which connects back to device
one.
Which cable is used in LAN?
STP cable is mostly used by IBM; it has an extra cover over each pair.
UTP cable is used in star topology. It has a single cover over all pair.
What is IEEE?
The Institute of Electrical and Electronics Engineers or IEEE (read eye-triplee) is an international non-profit, professional organization for the
IEEE 802.3 is a collection of IEEE standards defining the physical layer and
the media access control (MAC) of the data link layer of wired Ethernet.
Physical connections are made between nodes and infrastructure devices
hubs, switches and routers by various types of copper or fiber cable.
Full form of ping.
64MB RAM
1.5GB free HDD space
233MHz minimum processor.
What are 10Base2, 10Base5 and 10BaseT Ethernet LANs?
An unspecified passive open has the server waiting for a connection request
from a client.
A fully specified passive open has the server waiting for a connection from a
specific client.
Explain the function of Transmission Control Block
The Mount protocol returns a file handle and the name of the file system in
which a requested file resides. The message is sent to the client from the
server after reception of a client's request
What is External Data Representation?
Tracert traceroute Ping Arp Netstat Nbtstat NetBIOS Ipconfig winipcfg nslookup
Tracert / traceroute
Tracert: Determines the path taken to a destination by sending Internet Control Message
Protocol (ICMP) Echo Request messages to the destination with incrementally increasing Time
to Live (TTL) field values. The path displayed is the list of near-side router interfaces of the
routers in the path between a source host and a destination. The near-side interface is the
interface of the router that is closest to the sending host in the path. Used without parameters,
tracert displays help.
This diagnostic tool determines the path taken to a destination by sending ICMP Echo Request
messages with varying Time to Live (TTL) values to the destination. Each router along the path
is required to decrement the TTL in an IP packet by at least 1 before forwarding it.
Effectively, the TTL is a maximum link counter. When the TTL on a packet reaches 0, the router
is expected to return an ICMP Time Exceeded message to the source computer. Tracert
determines the path by sending the first Echo Request message with a TTL of 1 and incrementing
the TTL by 1 on each subsequent transmission until the target responds or the maximum number
of hops is reached. The maximum number of hops is 30 by default and can be specified using the
-h parameter.
The path is determined by examining the ICMP Time Exceeded messages returned by
intermediate routers and the Echo Reply message returned by the destination. However, some
routers do not return Time Exceeded messages for packets with expired TTL values and are
invisible to the tracert command. In this case, a row of asterisks (*) is displayed for that hop.
Examples:
To trace the path to the host named www.google.co.in type:
tracert www.google.co.in
To trace the path to the host named www.google.com and prevent the resolution of each IP
address to its name, type:
tracert -d www.google.com
To trace the path to the host named www.google.com and use the loose source route 10.12.0.110.29.3.1-10.1.44.1, type:
tracert -j 10.12.0.1 10.29.3.1 10.1.44.1 www.google.com
Syntax
tracert [-d] [-h MaximumHops] [-j HostList] [-w Timeout] [TargetName]
Parameters
-d Prevents tracert from attempting to resolve the IP addresses of intermediate routers to their
names. This can speed up the display of tracert results.
-h MaximumHops Specifies the maximum number of hops in the path to search for the target
(destination). The default is 30 hops.
-j HostList Specifies that Echo Request messages use the Loose Source Route option in the IP
header with the set of intermediate destinations specified in HostList. With loose source routing,
successive intermediate destinations can be separated by one or multiple routers. The maximum
number of addresses or names in the host list is 9. The HostList is a series of IP addresses (in
dotted decimal notation) separated by spaces.
-w Timeout Specifies the amount of time in milliseconds to wait for the ICMP Time Exceeded or
Echo Reply message corresponding to a given Echo Request message to be received. If not
received within the time-out, an asterisk (*) is displayed. The default time-out is 4000 (4
seconds).
Ping
Verifies IP-level connectivity to another TCP/IP computer by sending Internet Control Message
Protocol (ICMP) Echo Request messages. The receipt of corresponding Echo Reply messages
are displayed, along with round-trip times. Ping is the primary TCP/IP command used to
troubleshoot connectivity, reachability, and name resolution.
You can use ping to test both the computer name and the IP address of the computer. If pinging
the IP address is successful, but pinging the computer name is not, you might have a name
resolution problem. In this case, ensure that the computer name you are specifying can be
resolved through the local Hosts file, by using Domain Name System (DNS) queries, or through
NetBIOS name resolution techniques.
To test a TCP/IP configuration by using the ping command:
To quickly obtain the TCP/IP configuration of a computer, open Command Prompt, and
then type ipconfig . From the display of the ipconfig command, ensure that the network
adapter for the TCP/IP configuration you are testing is not in a Media disconnected state.
At the command prompt, ping the loopback address by typing ping 127.0.0.1
Ping the IP address of the default gateway. If the ping command fails, verify that the
default gateway IP address is correct and that the gateway (router) is operational.
Ping the IP address of a remote host (a host that is on a different subnet). If the ping
command fails, verify that the remote host IP address is correct, that the remote host is
operational, and that all of the gateways (routers) between this computer and the remote
host are operational.
Ping the IP address of the DNS server. If the ping command fails, verify that the DNS
server IP address is correct, that the DNS server is operational, and that all of the
gateways (routers) between this computer and the DNS server are operational.
Arp
Displays and modifies entries in the Address Resolution Protocol (ARP) cache, which contains
one or more tables that are used to store IP addresses and their resolved Ethernet or Token Ring
physical addresses. There is a separate table for each Ethernet or Token Ring network adapter
installed on your computer.
Syntax
arp [-a [InetAddr] [-N IfaceAddr]] [-g [InetAddr] [-N IfaceAddr]] [-d InetAddr [IfaceAddr]] [-s
InetAddr EtherAddr [IfaceAddr]]
Parameters
Used without parameters, ping displays help
-a [InetAddr] [-N IfaceAddr] Displays current ARP cache tables for all interfaces. To display the
ARP cache entry for a specific IP address, use arp -a with the InetAddr parameter, where
InetAddr is an IP address. To display the ARP cache table for a specific interface, use the -N
IfaceAddr parameter where IfaceAddr is the IP address assigned to the interface. The -N
parameter is case-sensitive.
-g [InetAddr] [-N IfaceAddr] Identical to -a.
-d InetAddr [IfaceAddr] Deletes an entry with a specific IP address, where InetAddr is the IP
address. To delete an entry in a table for a specific interface, use the IfaceAddr parameter where
IfaceAddr is the IP address assigned to the interface. To delete all entries, use the asterisk (*)
wildcard character in place of InetAddr.
-s InetAddr EtherAddr [IfaceAddr] Adds a static entry to the ARP cache that resolves the IP
address InetAddr to the physical address EtherAddr. To add a static ARP cache entry to the table
for a specific interface, use the IfaceAddr parameter where IfaceAddr is an IP address assigned to
the interface.
Examples:
To display the ARP cache tables for all interfaces, type:
arp -a
To display the ARP cache table for the interface that is assigned the IP address 10.0.0.99, type:
arp -a -N 10.0.0.99
To add a static ARP cache entry that resolves the IP address 10.0.0.80 to the physical address 00AA-00-4F-2A-9C, type:
arp -s 10.0.0.80 00-AA-00-4F-2A-9C
Netstat
Displays active TCP connections, ports on which the computer is listening, Ethernet statistics,
the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6
statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols).
Local Address - The IP address of the local computer and the port number being used.
The name of the local computer that corresponds to the IP address and the name of the
port is shown unless the -n parameter is specified. If the port is not yet established, the
port number is shown as an asterisk (*).
Foreign Address - The IP address and port number of the remote computer to which the
socket is connected. The names that corresponds to the IP address and the port are shown
unless the -n parameter is specified. If the port is not yet established, the port number is
shown as an asterisk (*).
(state) Indicates the state of a TCP connection. The possible states are as follows:
CLOSE_WAIT
CLOSED
ESTABLISHED
FIN_WAIT_1
FIN_WAIT_2
LAST_ACK
LISTEN
SYN_RECEIVED
SYN_SEND
TIMED_WAIT
Syntax
netstat [-a] [-e] [-n] [-o] [-p Protocol] [-r] [-s] [Interval]
Parameters
Used without parameters, netstat displays active TCP connections.
-a Displays all active TCP connections and the TCP and UDP ports on which the computer is
listening.
-e Displays Ethernet statistics, such as the number of bytes and packets sent and received. This
parameter can be combined with -s.
-n Displays active TCP connections, however, addresses and port numbers are expressed
numerically and no attempt is made to determine names.
-o Displays active TCP connections and includes the process ID (PID) for each connection. You
can find the application based on the PID on the Processes tab in Windows Task Manager. This
parameter can be combined with -a, -n, and -p.
-p Shows connections for the protocol specified by Protocol. In this case, the Protocol can be tcp,
udp, tcpv6, or udpv6. If this parameter is used with -s to display statistics by protocol, Protocol
can be tcp, udp, icmp, ip, tcpv6, udpv6, icmpv6, or ipv6.
-s Displays statistics by protocol. By default, statistics are shown for the TCP, UDP, ICMP, and
IP protocols. If the IPv6 protocol for Windows XP is installed, statistics are shown for the TCP
over IPv6, UDP over IPv6, ICMPv6, and IPv6 protocols. The -p parameter can be used to specify
a set of protocols.
-r Displays the contents of the IP routing table. This is equivalent to the route print command.
Interval Redisplays the selected information every Interval seconds. Press CTRL+C to stop the
redisplay. If this parameter is omitted, netstat prints the selected information only once.
/? - Displays help at the command prompt.
Nbtstat
Displays NetBIOS over TCP/IP (NetBT) protocol statistics,
NetBIOS
NetBIOS name tables for both the local computer and remote computers, and the NetBIOS name
cache. Nbtstat allows a refresh of the NetBIOS name cache and the names registered with
Windows Internet Name Service (WINS).
Nbtstat command-line parameters are case-sensitive.
Syntax
nbtstat [-a RemoteName] [-A IPAddress] [-c] [-n] [-r] [-R] [-RR] [-s] [-S] [Interval]
Parameters
Used without parameters, nbtstat displays help.
-a RemoteName Displays the NetBIOS name table of a remote computer, where RemoteName is
the NetBIOS computer name of the remote computer. The NetBIOS name table is the list of
NetBIOS names that corresponds to NetBIOS applications running on that computer.
-A IPAddress Displays the NetBIOS name table of a remote computer, specified by the IP
address (in dotted decimal notation) of the remote computer.
-c Displays the contents of the NetBIOS name cache, the table of NetBIOS names and their
resolved IP addresses.
-n Displays the NetBIOS name table of the local computer. The status of Registered indicates
that the name is registered either by broadcast or with a WINS server.
-r Displays NetBIOS name resolution statistics. On a Windows XP computer that is configured
to use WINS, this parameter returns the number of names that have been resolved and registered
using broadcast and WINS.
-R Purges the contents of the NetBIOS name cache and then reloads the #PRE-tagged entries
from the Lmhosts file.
-RR Releases and then refreshes NetBIOS names for the local computer that is registered with
WINS servers.
-s Displays NetBIOS client and server sessions, attempting to convert the destination IP address
to a name.
-S Displays NetBIOS client and server sessions, listing the remote computers by destination IP
address only.
Interval Redisplays selected statistics, pausing the number of seconds specified in Interval
between each display. Press CTRL+C to stop redisplaying statistics. If this parameter is omitted,
nbtstat prints the current configuration information only once.
/? - Displays help at the command prompt.
Ipconfig
Displays all current TCP/IP network configuration values and refreshes Dynamic Host
Configuration Protocol (DHCP) and Domain Name System (DNS) settings. This command is
most useful on computers that are configured to obtain an IP address automatically. This enables
users to determine which TCP/IP configuration values have been configured by DHCP,
Automatic Private IP Addressing (APIPA), or an alternate configuration.
If the Adapter name contains any spaces, use quotation marks around the adapter name
(that is, "Adapter Name").
For adapter names, ipconfig supports the use of the asterisk (*) wildcard character to
specify either adapters with names that begin with a specified string or adapters with
names that contain a specified string.
For example, Local* matches all adapters that start with the string Local and *Con*
matches all adapters that contain the string Con.
Syntax
ipconfig [/all] [/renew [Adapter]] [/release [Adapter]] [/flushdns] [/displaydns] [/registerdns]
[/showclassid Adapter] [/setclassid Adapter [ClassID]]
Parameters
Used without parameters, ipconfig displays the IP address, subnet mask, and default gateway for
all adapters.
/all Displays the full TCP/IP configuration for all adapters. Without this parameter, ipconfig
displays only the IP address, subnet mask, and default gateway values for each adapter. Adapters
can represent physical interfaces, such as installed network adapters, or logical interfaces, such
as dial-up connections.
/renew [Adapter] Renews DHCP configuration for all adapters (if an adapter is not specified) or
for a specific adapter if the Adapter parameter is included. This parameter is available only on
computers with adapters that are configured to obtain an IP address automatically. To specify an
adapter name, type the adapter name that appears when you use ipconfig without parameters.
/release [Adapter] Sends a DHCPRELEASE message to the DHCP server to release the current
DHCP configuration and discard the IP address configuration for either all adapters (if an adapter
is not specified) or for a specific adapter if the Adapter parameter is included. This parameter
disables TCP/IP for adapters configured to obtain an IP address automatically. To specify an
adapter name, type the adapter name that appears when you use ipconfig without parameters.
/flushdns Flushes and resets the contents of the DNS client resolver cache. During DNS
troubleshooting, you can use this procedure to discard negative cache entries from the cache, as
well as any other entries that have been added dynamically.
/displaydns Displays the contents of the DNS client resolver cache, which includes both entries
preloaded from the local Hosts file and any recently obtained resource records for name queries
resolved by the computer. The DNS Client service uses this information to resolve frequently
queried names quickly, before querying its configured DNS servers.
/registerdns Initiates manual dynamic registration for the DNS names and IP addresses that are
configured at a computer. You can use this parameter to troubleshoot a failed DNS name
registration or resolve a dynamic update problem between a client and the DNS server without
rebooting the client computer. The DNS settings in the advanced properties of the TCP/IP
protocol determine which names are registered in DNS.
/showclassid Adapter Displays the DHCP class ID for a specified adapter. To see the DHCP class
ID for all adapters, use the asterisk (*) wildcard character in place of Adapter. This parameter is
available only on computers with adapters that are configured to obtain an IP address
automatically.
/setclassid Adapter [ClassID] Configures the DHCP class ID for a specified adapter. To set the
DHCP class ID for all adapters, use the asterisk (*) wildcard character in place of Adapter. This
parameter is available only on computers with adapters that are configured to obtain an IP
address automatically. If a DHCP class ID is not specified, the current class ID is removed.
Examples:
To display the basic TCP/IP configuration for all adapters, type:
ipconfig
ipconfig /all
To renew a DHCP-assigned IP address configuration for only the Local Area Connection adapter,
type:
To flush the DNS resolver cache when troubleshooting DNS name resolution problems, type:
ipconfig /flushdns
To display the DHCP class ID for all adapters with names that start with Local, type:
To set the DHCP class ID for the Local Area Connection adapter to TEST, type:
winipcfg
This utility allows users or adminstrators to see the current IP address and other useful
information about your network configuration. You can reset one or more IP addresses. The
Release or Renew buttons allow you to release or renew one IP address. If you want to release or
renew all IP addresses click Release All or Renew All. When one of these buttons is clicked, a
new IP address is obtained from either the DHCP service or from the computer assigning itself
an automatic private IP address. To use the winipcfg utility:
To see the addresses of the DNS servers the computer is configured to use, click the
ellipsis (...) button to the right of DNS Servers.
To see address information for your network adapter(s), select an adapter from the list in
Ethernet Adapter Information.
nslookup
Nslookup (Name Server lookup) is a UNIX shell command to query Internet domain name
servers.
Definitions
Nameserver: These are the servers that the internet uses to find out more about the
domain. Usually they are an ISP's computer.
FTPserver: FTP is file transfer protocol, this server is where files may be stored.
Real Hostname: This is hostname that you get by reverse resolving the IP address, may
be different to the given hostname.
IP Address: Unique four numbered identifier that is obtained by resolving the hostname.