Кафедра ИСиТ УО ВГТУ
  • Специальности
    • Экономика электронного бизнеса
    • Информационные системы
    • Information Control Systems
  • Каталог
  • Сайт кафедры
  • Сервисы
    • GitLab
    • ownCloud
    • JupyterHub
    • JupyterHub 2
    • VNC
    • Soft
  1. ICS
  2. TSTPI
  3. Practice
  4. Basic Network Utilities
  • ICS
    • ITCS
      • Theory
        • Computer security issues
        • Computer Security Mechanisms
        • Common Principles of Cryptography
        • Asymmetric encryption
        • Data integrity
        • Steganographic methods for information protection
      • Practice
        • Basics of Symmetric Encryption Algorithms
        • Asymmetric crypto algorithms
        • Data Integrity
    • TSTPI
      • Theory
        • Fundamentals of Data Transmission Networks
        • Fundamentals of digital data transmission
        • Network interconnection using network layer protocols
        • Trends in the development of telecommunication technologies and computer networks
        • Search Engines
        • Information security. Confidential information
      • Practice
        • Basic Network Utilities
        • Installing of Network OS
        • Linux network utilities
        • SSH Protocol
        • User Accounts Management
        • Protocol Analysis Using a Network Traffic Analyzer

On this page

  • IPCONFIG utility
    • Tasks:
  • PING utility
    • Tasks:
  • TRACERT utility
    • Tasks:
  • ROUTE utility
    • ROUTE command syntax:
    • Tasks:
  • ARP utility 
    • Utility parameters:
    • Tasks:
  • NET utility
    • Common options for using the utility:
    • Tasks:
  1. ICS
  2. TSTPI
  3. Practice
  4. Basic Network Utilities

Basic Network Utilities

Search Transfer and Protection of Information
Practice
Author

Andrei Biziuk

Published

February 29, 2024

IPCONFIG utility

The utility is used to determine the current IP protocol settings. By default, only the IP address, subnet mask, and default gateway are displayed for each adapter associated with TCP/IP. To display complete information about the configuration, set the /all key.

Ipconfig /all

Help on IPCONFIG and a list of command keys can be found by running it with the /? key.

Ipconfig /?

Tasks:

  1. Examine the IP protocol configuration on your computer. Explain the meaning of the main parameters.

  2. Find the network name of your computer.

  3. Find the MAC and IP addresses of your computer

  4. Display the contents of your computer’s DNS cache. Study the information received.

  5. Clear the DNS cache. Make sure the cache is cleared.

PING utility

The PING (Packet Internetwork Groper) utility is most often used to detect a basic network connection on TCP/IP networks.

To check the activity of a remote host, the PING utility uses a series of ICMP echo messages that determine the period for returning datagrams from the specified host and thereby allow you to “listen” to the network path to it.

The operating parameters of the PING utility are specified on the command line. In addition to the address (or name) of the host being checked, which is a required parameter, the user can set, for example, the response waiting time, intervals for sending requests, the number of request packets, packet size and other parameters that may be supported by the program depending on its version and operating system :

-f — Sets a flag that disables packet fragmentation.

-i number — Set the packet lifetime (TTL, time to live)

-n number — Number of requests sent

-t — Send packets before interrupt command

-l number — Size of packet sent

-w number — Response waiting interval in milliseconds

Tasks:

  1. Find out the addresses of neighboring computers and determine their availability

  2. Do the same, but setting the package size to 2kb and the number of packages to 10

  3. Try to run the utility by setting the packet size to 30kb and disabling fragmentation. Explain your result. Determine the maximum packet size for your network experimentally.

  4. Run the utility to send packets before the interrupt command. Stop sending packets using the Ctrl+C key combination.

TRACERT utility

The utility allows you to determine the route of a packet from the user to the remote host.

The utility sends a sequence of UDP packets (3 packets by default), each with the TTL parameter set to 1, to a non-existent port on the remote host. The first router on the path destroys the packets and sends a “time exceeded message” ICMP message to the sender. which contain timestamps and the router address.

After this, the TRACERT utility sends packets with the TTL parameter = 2. These packets will reach the second router and will be destroyed by it. This way the sender knows the address of the second router.

The process will continue until the destination host is reached or the maximum number of hops is exceeded.

Tasks:

  1. Learn the TRACERT command options.

  2. Try to determine the route to any of the “neighboring” computers. (to speed up the utility, use the -d switch).

  3. Try to determine routes to hosts with addresses 192.168.11.119, 192.168.1.55. Comment on the result.

ROUTE utility

The utility is used to view and change the IP routing table on a given computer.

ROUTE command syntax:

ROUTE [-f] [-p] command [address] [MASK mask] [gateway] [METRIC metric] [IF interface]

Commands:

PRINT — Displays the route table on the screen

ADD — Adding a route

DELETE — Deleting a route

CHANGE — Route change

Tasks:

  1. Determine the list of IP protocol routes on your computer.

  2. Add a new route to the list, specifying 192.168.11.119 as the gateway. Check the availability of the host to which you added the path.

  3. Remove the previously added route.

ARP utility 

This utility is used to view and change the table of mappings between physical addresses and IP addresses used by the ARP protocol.

Utility parameters:

-a [address]

Displays a table of addresses. If the optional “address” parameter is specified, then only the record corresponding to this address is displayed.

-s ip_address mac_address

Adds a record to the table.

-d ip_address

Removes a record from the table.

Tasks:

  1. Display the ARP table.

  2. Determine the physical address of a neighboring computer using the ARP and PING commands. (if the address of the neighboring computer is not in the ARP table, you need to poll it using the PING command, after which the address should appear). Remember this address.

  3. Clear the ARP table (you can use the wildcard * to denote all addresses)

  4. Write a command to add an entry to the ARP table of a previously learned address. Check site availability. For which the entry was added.

NET utility

The NET utility is used to manage the operation of most network services and operating system resources. The utility has a huge number of operating modes, depending on the specific implementation.

Common options for using the utility:

NET HELP [command]

Displaying a list of valid commands or help information for a specific command

NET CONFIG [SERVER | WORKSTATION]

Displays information about configuring workstation or server services.

NET VIEW /DOMAIN

Displays a list of local network domains

NET VIEW [/DOMAIN:domain_name]

Displays a list of computers in the current or specified domain.

NET VIEW \\computername

Lists the resources available for sharing on the specified computer.

NET USE

Displays a list of connected network resources

NET USE device_name\\computer_name\resource_name

Connects a computer to a shared resource

NET USE device_name /DELETE

Disconnects the computer from the shared resource.

NET START

Displays a list of services installed on this computer

NET START service_name

Starts the specified service

NET STOP service_name

Stops the specified service

NET PAUSE service_name

Suspends the specified service

NET CONTINUE service_name

Resumes execution of the specified service

Tasks:

  1. List available NET utility commands

  2. View help for some commands. Use the /? Or the HELP command.

  3. Browse the list of domains on the network. View a list of computers in a domain. View a list of open network resources on a computer.

  4. Map some network resource as a network drive. Use Windows Explorer to check the contents of the disk. Disconnect the network drive.

Back to top
Practice
Installing of Network OS