SlideShare a Scribd company logo
Introduction to
command line for
networking.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Command line tools.
– Networking command line utilities.
PACE-IT
Page 4
Introduction to command line for networking.
Page 5
– Command line tools.
» A utility or set of utilities that is accessed from the command
line interrupter (CLI).
» Usually accessed from the desktop, but not always.
– How to access via Windows Vista or
Windows 7.
» Left click the Start button.
» Type “cmd” or “command” in the search box and press the
return key.
– How to Access via Windows XP.
» Left click the Start button.
» Left click on Run.
» Type “cmd” or “command” in the run box and press the return
key.
Introduction to command line for networking.
Page 6
Introduction to command line for networking.
Page 7
– ping.
» Can be used to check for TCP/IP stack initialization.
» Checks for basic connectivity.
» Uses ICMP echo requests.
» Basic command format:
• You can ping XXX.XXX.XXX.XXX (the dotted decimal
IP address).
• You can also ping www.google.com (the human friendly
address).
» The behavior of ping can be modified; once in ping, type
“/?” to find modifiers.
Introduction to command line for networking.
Page 8
– tracert.
» Microsoft implementation (traceroute = Unix, Linux, and
OS X).
» Traces the route between two nodes.
» Uses ICMP requests.
» Logs responses from routers.
» The utility has limited usability, as many routers block
ICMP requests.
» Basic command format:
• You can tracert XXX.XXX.XXX to find the route to a
destination.
• You can also use a human friendly address (e.g.,
www.google.com) with tracert to find the route.
» The behavior of tracert can be modified; once in tracert,
type “/?” to get a list of available modifiers.
Introduction to command line for networking.
Page 9
– netstat.
» Used to list all inbound and outbound TCP/IP connections on a
given node.
» Useful in determining which connections are consuming
network resources.
– net.
» Most common use is to map a remote shared drive or resource
to the current node.
• Example: C:net use Z //bob.jones/shared.doc.
» Has other great uses: Do a Google search for “Windows 7
password recovery” to find them.
– nslookup.
» Used to query DNS (Domain Name System) to determine if a
record exists.
» Troubleshoots DNS issues.
Introduction to command line for networking.
Page 10
Introduction to command line for networking.
nbtstat.
Used to troubleshoot
NetBios over TCP/IP.
Similar to arp, only with NetBios
(NetBios is the human friendly name
given to nodes in a Microsoft
networking environment).
ipconfig.
Used to list the IP
configuration on a node.
A powerful tool, especially when
used with ping and tracert.
arp.
Address resolution
protocol utility.
Used to resolve IP addresses to
MAC addresses. Use arp as a
command to resolve arp table issus.
Page 11
Introduction to command line for networking.
A utility or set of utilities that is accessed from the command prompt in the
command line interpreter (CLI).
Topic
Command line tools.
Summary
There are a number of command line utilities that can be used to assist with
networking, including ping, tracert, netstat, net, nslookup, nbtstat, ipconfig,
and arp. All commands can be modified by a “/” followed by the desired
modifier (e.g., C:>ping /a).
Networking command line
utilities.
Page 12
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

PPTX
Pace IT - Command Line OS (Part 1)
PPTX
Pace IT - Command Line OS (Part 2)
PPTX
Pace IT - Admin Tools (Part 2)
PPTX
Pace IT - Admin Tools (Part 1)
PPTX
Pace IT - Admin Tools (Part 3)
PPTX
Pace IT - Introduction to the Bios
PPTX
Pace IT - Introduction to_the_Motherboard
PPTX
Pace IT - Troubleshooting OS part 2
Pace IT - Command Line OS (Part 1)
Pace IT - Command Line OS (Part 2)
Pace IT - Admin Tools (Part 2)
Pace IT - Admin Tools (Part 1)
Pace IT - Admin Tools (Part 3)
Pace IT - Introduction to the Bios
Pace IT - Introduction to_the_Motherboard
Pace IT - Troubleshooting OS part 2

What's hot (11)

PPTX
Pace IT - Expansion Cards
PPTX
Pace IT - Custom Configurations
PPTX
Computer Literacy Lesson 04
PPTX
Computer Literacy Lesson 9
PPTX
Pace IT - Power Supplies
PPTX
Computer Literacy Lesson 1: Computer and Operating Systems
PPTX
Computer Literacy Lesson 31
PPTX
Pace IT - Cables and Connections
PPTX
Computer Literacy Lesson 5
PPTX
Computer Literacy Lesson 6
PPTX
Computer Literacy Lesson 5
Pace IT - Expansion Cards
Pace IT - Custom Configurations
Computer Literacy Lesson 04
Computer Literacy Lesson 9
Pace IT - Power Supplies
Computer Literacy Lesson 1: Computer and Operating Systems
Computer Literacy Lesson 31
Pace IT - Cables and Connections
Computer Literacy Lesson 5
Computer Literacy Lesson 6
Computer Literacy Lesson 5
Ad

Similar to Pace IT - Command Line Networking (20)

PPTX
PACE-IT: Troubleshooting Connectivity With Utilities
PPTX
Pace IT - Troubleshooting Networks Wired
PPTX
PACE-IT: Network Infrastructure Implementations - N10 006
PPTX
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PPTX
PACE-IT: Common Network Vulnerabilities
PPTX
PACE-IT: Common Networking Protocols (part 2)
PPT
Ch14
PPTX
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PPTX
Pace IT - Threats & Vulnerabilities Mitigation
PPTX
PACE-IT, Security+1.4: Common Network Protocols (part 1)
PPTX
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PPTX
PACE-IT, Security+1.2: Secure Network Administration Concepts
PPTX
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PPTX
PACE-IT: Common Threats (part 1)
PPTX
Pace IT - Client Networking (Part 3)
PPTX
Pace IT - Control Panel (Part 3)
PPTX
PACE-IT: Analyzing Monitoring Reports
PPTX
PACE-IT: Networking Services and Applications (part 2) - N10 006
PPTX
Pace IT - Client Networking (Part 1)
PPS
Network Design and Management
PACE-IT: Troubleshooting Connectivity With Utilities
Pace IT - Troubleshooting Networks Wired
PACE-IT: Network Infrastructure Implementations - N10 006
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PACE-IT: Common Network Vulnerabilities
PACE-IT: Common Networking Protocols (part 2)
Ch14
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
Pace IT - Threats & Vulnerabilities Mitigation
PACE-IT, Security+1.4: Common Network Protocols (part 1)
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PACE-IT: Common Threats (part 1)
Pace IT - Client Networking (Part 3)
Pace IT - Control Panel (Part 3)
PACE-IT: Analyzing Monitoring Reports
PACE-IT: Networking Services and Applications (part 2) - N10 006
Pace IT - Client Networking (Part 1)
Network Design and Management
Ad

More from Pace IT at Edmonds Community College (20)

PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PPTX
PACE-IT, Security + 5.3: Security Controls for Account Management
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PPTX
PACE-IT, Security + 5.1: Summary of Authentication Services
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PPTX
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PPTX
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PPTX
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PPTX
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PPTX
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PPTX
PACE-IT, Security+3.6: Security Enhancement Techniques
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)

Recently uploaded (20)

PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Pre independence Education in Inndia.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Cell Types and Its function , kingdom of life
PPTX
Institutional Correction lecture only . . .
PDF
Complications of Minimal Access Surgery at WLH
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Basic Mud Logging Guide for educational purpose
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Abdominal Access Techniques with Prof. Dr. R K Mishra
Renaissance Architecture: A Journey from Faith to Humanism
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPH.pptx obstetrics and gynecology in nursing
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Final Presentation General Medicine 03-08-2024.pptx
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Pre independence Education in Inndia.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Cell Types and Its function , kingdom of life
Institutional Correction lecture only . . .
Complications of Minimal Access Surgery at WLH
2.FourierTransform-ShortQuestionswithAnswers.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Basic Mud Logging Guide for educational purpose
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...

Pace IT - Command Line Networking

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Command line tools. – Networking command line utilities. PACE-IT
  • 4. Page 4 Introduction to command line for networking.
  • 5. Page 5 – Command line tools. » A utility or set of utilities that is accessed from the command line interrupter (CLI). » Usually accessed from the desktop, but not always. – How to access via Windows Vista or Windows 7. » Left click the Start button. » Type “cmd” or “command” in the search box and press the return key. – How to Access via Windows XP. » Left click the Start button. » Left click on Run. » Type “cmd” or “command” in the run box and press the return key. Introduction to command line for networking.
  • 6. Page 6 Introduction to command line for networking.
  • 7. Page 7 – ping. » Can be used to check for TCP/IP stack initialization. » Checks for basic connectivity. » Uses ICMP echo requests. » Basic command format: • You can ping XXX.XXX.XXX.XXX (the dotted decimal IP address). • You can also ping www.google.com (the human friendly address). » The behavior of ping can be modified; once in ping, type “/?” to find modifiers. Introduction to command line for networking.
  • 8. Page 8 – tracert. » Microsoft implementation (traceroute = Unix, Linux, and OS X). » Traces the route between two nodes. » Uses ICMP requests. » Logs responses from routers. » The utility has limited usability, as many routers block ICMP requests. » Basic command format: • You can tracert XXX.XXX.XXX to find the route to a destination. • You can also use a human friendly address (e.g., www.google.com) with tracert to find the route. » The behavior of tracert can be modified; once in tracert, type “/?” to get a list of available modifiers. Introduction to command line for networking.
  • 9. Page 9 – netstat. » Used to list all inbound and outbound TCP/IP connections on a given node. » Useful in determining which connections are consuming network resources. – net. » Most common use is to map a remote shared drive or resource to the current node. • Example: C:net use Z //bob.jones/shared.doc. » Has other great uses: Do a Google search for “Windows 7 password recovery” to find them. – nslookup. » Used to query DNS (Domain Name System) to determine if a record exists. » Troubleshoots DNS issues. Introduction to command line for networking.
  • 10. Page 10 Introduction to command line for networking. nbtstat. Used to troubleshoot NetBios over TCP/IP. Similar to arp, only with NetBios (NetBios is the human friendly name given to nodes in a Microsoft networking environment). ipconfig. Used to list the IP configuration on a node. A powerful tool, especially when used with ping and tracert. arp. Address resolution protocol utility. Used to resolve IP addresses to MAC addresses. Use arp as a command to resolve arp table issus.
  • 11. Page 11 Introduction to command line for networking. A utility or set of utilities that is accessed from the command prompt in the command line interpreter (CLI). Topic Command line tools. Summary There are a number of command line utilities that can be used to assist with networking, including ping, tracert, netstat, net, nslookup, nbtstat, ipconfig, and arp. All commands can be modified by a “/” followed by the desired modifier (e.g., C:>ping /a). Networking command line utilities.
  • 13. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.