The important Computer Network tools Commands that helps to establish and trace Information exchange in Computer Network are list below with well mentioned their uses method. like Ping, ipconfig/all, netstat, tracert, netsh, arp etc.
-
Ping
The ping command is a network utility tool that sends an Internet Control Message Protocol (ICMP) Echo Request message to a target host or IP address, and waits for an ICMP Echo Reply message in response. The command is typically used to test the connectivity between two hosts on a network, measure the round-trip time for packets to travel between them, and to identify network performance issues such as packet loss or high latency.
To use the ping command, you would typically open a command prompt or terminal window and type “ping” followed by the IP address or hostname of the target system. For example:
ping www.google.com
The command would then send a series of ICMP packets to the target host and display the round-trip time, packet loss statistics, and other information about the network connection between the two hosts. The ping command is available on most operating systems, including Windows, macOS, and Linux.
-
Traceroute / Tracert
The traceroute (on Unix/Linux) or tracert (on Windows) command is a network utility tool used to trace the route that packets take from a source to a destination on an IP network. It works by sending packets with incrementing TTL (Time-To-Live) values, starting with a TTL of 1, towards the destination host. Each intermediate router along the path decrements the TTL value by 1, and when the TTL reaches 0, the router sends an ICMP Time Exceeded message back to the source. The traceroute or tracert command then records the IP address and round-trip time of each router that responded to the packet, until the destination is reached or a specified number of hops is reached.
To use the traceroute or tracert command, you would typically open a command prompt or terminal window and type “traceroute” or “tracert” followed by the IP address or hostname of the target system. For example:
traceroute www.google.com
The command would then display the IP address and round-trip time of each router that the packets traversed on the way to the destination. This can be useful for diagnosing network routing problems, identifying network bottlenecks, and troubleshooting network connectivity issues.
Note that some networks or routers may block or filter ICMP packets, which can affect the accuracy of traceroute or tracert results. In such cases, alternative tools such as mtr (My traceroute) or PathPing may be used instead.
-
Ipconfig / Ifconfig
The ipconfig command is a network utility tool used to display and manage the network configuration of a Windows computer. It can be used to view the IP address, subnet mask, default gateway, and other network settings for all network adapters installed on the system.
To use the ipconfig command, you would typically open a command prompt or PowerShell window and type “ipconfig” followed by various options to display specific information. For example:
ipconfig /all
This command displays detailed information about all network adapters on the system, including their IP addresses, MAC addresses, DNS servers, and more.
On Unix/Linux systems, the equivalent command is ifconfig (interface configuration). The ifconfig command is used to view and configure network interface parameters, such as IP addresses, netmasks, and broadcast addresses.
To use the ifconfig command, you would typically open a terminal window and type “ifconfig” followed by the name of the network interface you want to view or configure. For example:
ifconfig eth0
This command displays information about the eth0 network interface, including its IP address, netmask, and other configuration parameters. The ifconfig command is often used in combination with other tools, such as route, to diagnose and troubleshoot network connectivity issues.
-
Nslookup
The nslookup command is a network utility tool used to query the Domain Name System (DNS) to resolve domain names to IP addresses and vice versa. It allows you to check whether a DNS server is responding to queries and obtain information about the DNS records associated with a domain name.
To use the nslookup command, you would typically open a command prompt or terminal window and type “nslookup” followed by the domain name or IP address you want to query. For example:
nslookup www.google.com
This command would query the DNS server configured on your system and display the IP address associated with the www.google.com domain name.
You can also use the nslookup command to query specific DNS servers, set query type, and perform other advanced operations. For example:
nslookup -type=mx example.com 8.8.8.8
This command queries the DNS server at 8.8.8.8 for the MX (Mail Exchange) records of the example.com domain name.
The nslookup command is available on most operating systems, including Windows, macOS, and Linux. It is a useful tool for troubleshooting DNS-related issues, such as DNS resolution errors, DNS server failures, and DNS misconfigurations.
-
Whois
- Download Whois Program from Microsoft’s site.
- Create a folder in your computer( eg. whois) and Extract the content of the downloaded zip file to your created folder.
- example — D:\whois
- You will find whois.exe and whois64.exe under your extracted location. In my case it is D:\whois\whois.exe and D:\whois\whois64.exe
- Open command prompt. (Press Win+R keys and type ‘cmd’ then hit enter)
- Navigate to the directory where you extracted the whois.exe. In my case I will type
> cd D:\whois- Run ‘whois’ command now and it should work. Example —
D:\whois> whois google.comThe whois command is a network utility tool used to query a database of domain name registration information. It allows you to obtain information about a domain name, such as the name and contact information of the registrant, the date of creation and expiration of the domain, the DNS servers associated with the domain, and more.
To use the whois command, you would typically open a command prompt or terminal window and type “whois” followed by the domain name you want to query. For example:
whois google.com
This command would query the WHOIS database and display information about the google.com domain name, including its registration date, expiration date, and contact information for the registrant, administrative contact, and technical contact.
The whois command is available on most operating systems, including Windows, macOS, and Linux. It is a useful tool for obtaining information about domain names, identifying domain name registrars, and checking the availability of domain names. However, note that some domain name registrars may choose not to publish all registration information or may provide incomplete or inaccurate information.
-
Netstat
The netstat command is a network utility tool used to display active network connections, listening ports, and other network statistics on a system. It allows you to monitor network activity and diagnose network-related issues, such as identifying which processes are using network resources and checking for unauthorized connections.
To use the netstat command, you would typically open a command prompt or terminal window and type “netstat” followed by various options to display specific information. For example:
netstat -a
This command displays all active network connections and listening ports on the system, along with their IP addresses and port numbers.
netstat -n
This command displays network connections and listening ports in numerical form, instead of resolving host names and service names.
netstat -p tcp
This command displays all active TCP connections on the system, along with the process ID (PID) of the process that created each connection.
The netstat command is available on most operating systems, including Windows, macOS, and Linux. It is a useful tool for monitoring network activity, diagnosing network connectivity issues, and identifying potential security threats. However, note that some modern operating systems, such as Windows 10 and macOS, have replaced netstat with newer, more advanced network monitoring tools, such as the Resource Monitor and the Activity Monitor, respectively.
-
PuTTY & Tera Term
PuTTY is a free and open-source terminal emulator, serial console, and network file transfer application. It is commonly used in computer networks for remote access and administration of servers, network devices, and other networked systems.
PuTTY is a versatile tool for network administrators and system operators, providing a range of features for remote access, secure communication, and file transfers in computer networks.
Here are some key features and uses of PuTTY in computer networks:
-
Terminal Emulation: PuTTY provides a terminal interface that allows users to connect to remote systems using various protocols, including SSH, Telnet, and serial connections. It supports a wide range of operating systems, including Windows, Linux, and macOS.
-
Secure Shell (SSH): PuTTY is widely known for its SSH client functionality, which allows secure remote access to systems over an encrypted connection. It provides authentication, encryption, and data integrity, making it a popular choice for remote administration and secure file transfers.
-
Telnet Client: PuTTY also supports the Telnet protocol, which allows users to establish unencrypted connections to remote systems. However, due to security concerns associated with Telnet, it is generally recommended to use SSH instead whenever possible.
-
Serial Console Connection: In addition to network protocols, PuTTY can establish serial connections to devices such as routers, switches, and industrial equipment. This is particularly useful for configuring and troubleshooting network devices using console ports.
-
File Transfer: PuTTY includes a file transfer utility called PSCP (PuTTY Secure Copy) that enables secure file transfers between local and remote systems. It supports SCP (Secure Copy) and SFTP (SSH File Transfer Protocol) for secure file transfer operations.
-
SSH Tunneling: PuTTY supports SSH tunneling, which allows users to create encrypted tunnels for forwarding network connections. This can be useful for securely accessing services or resources on remote networks through an encrypted channel.
-
Tera Term is another popular terminal emulator widely used in computer networks. It offers similar functionality to PuTTY but with some additional features. Here’s how Tera Term is used in network environments:
-
Terminal Emulation: Tera Term provides a terminal interface that allows users to connect to remote systems using protocols like SSH, Telnet, and serial connections. It supports various operating systems, including Windows.
-
Secure Shell (SSH): Like PuTTY, Tera Term includes an SSH client for secure remote access to systems over an encrypted connection. It offers features such as password authentication, public key authentication, and SSH port forwarding.
-
Telnet Client: Tera Term also supports the Telnet protocol for establishing unencrypted connections to remote systems. However, similar to PuTTY, it is generally recommended to use SSH instead of Telnet due to security concerns.
-
Serial Console Connection: Tera Term allows connecting to network devices and equipment that have console ports using serial connections. This enables configuration and management of routers, switches, and other network devices directly through the console interface.
-
Macro Automation: Tera Term includes a powerful macro scripting language that allows users to automate repetitive tasks. This feature is particularly useful for network administrators who need to perform batch operations or automate configuration tasks.
-
File Transfer: Tera Term supports file transfer protocols like TFTP (Trivial File Transfer Protocol) and SCP for transferring files between local and remote systems. It allows administrators to manage files on remote devices efficiently.
-
Serial Port Logging: Tera Term provides the capability to log data received from serial ports. This feature is valuable for troubleshooting and debugging purposes, as it allows users to capture and analyze communication between devices connected via serial connections.
8. Subnet and IP calculator
Subnet and IP calculators are tools used to perform calculations and calculations related to IP addresses and subnets in computer networks. They assist in tasks such as determining network and host addresses, calculating subnet masks, identifying available IP ranges, and more. These tools are commonly used by network administrators, engineers, and anyone involved in network planning and management. Here are some key functionalities typically found in subnet and IP calculators:
-
-
IP Address/Subnet Mask Calculation: Calculators allow you to input an IP address and subnet mask and provide information such as the network address, broadcast address, and the number of host addresses within the subnet.
-
Subnetting: Subnetting involves dividing a network into smaller subnets. IP calculators can help calculate the subnet mask, determine the number of subnets, and identify the subnet ranges and their corresponding network and broadcast addresses.
-
CIDR (Classless Inter-Domain Routing): CIDR notation is used to express IP addresses and their associated subnet masks. Calculators can convert between CIDR notation and standard dotted decimal notation, making it easier to work with and understand IP address ranges.
-
IP Range Calculation: IP calculators can determine the range of IP addresses available within a subnet. By inputting the network address and subnet mask, the calculator can provide the first and last usable IP addresses.
-
Wildcard Mask Calculation: In some networking configurations, wildcard masks are used instead of subnet masks. IP calculators can calculate the wildcard mask based on the subnet mask or vice versa.
-
VLSM (Variable Length Subnet Masking): VLSM allows for subnetting with different subnet mask lengths within the same network. IP calculators can assist in planning and calculating VLSM configurations by determining the required subnet masks and available IP ranges.
-
IP Address Conversion: Calculators often provide functionality to convert IP addresses between decimal, binary, and hexadecimal representations. This can be useful for troubleshooting or understanding network configurations.
-
Reverse DNS Lookup: Some IP calculators can perform reverse DNS lookups, allowing you to find the hostname associated with an IP address.
-
9. Speed test
Speedtest.net is a popular online service that allows users to test their internet connection speed. It is owned and operated by Ookla, a global leader in broadband testing and web-based network diagnostic applications. Speedtest.net provides a simple and reliable way to measure the speed of your internet connection, including download speed, upload speed, and ping (latency). Here’s how it generally works:
-
-
-
Visit the Speedtest.net website: To perform a speed test, you can visit the Speedtest.net website using a web browser on your device.
-
Start the test: On the website’s homepage, you’ll typically find a large “Go” or “Start” button to initiate the speed test. Clicking this button begins the testing process.
-
Server selection: Speedtest.net will automatically choose the best server based on your location to perform the test. However, you can also manually select a different server if desired.
-
Download speed test: The speed test measures your internet connection’s download speed by downloading a small file from the server to your device. It calculates the time taken to download the file and determines the download speed in megabits per second (Mbps).
-
Upload speed test: After the download speed test, Speedtest.net proceeds to measure your internet connection’s upload speed. It uploads a small file from your device to the server and calculates the upload speed in Mbps.
-
Ping/Latency test: The final part of the speed test measures the ping, which represents the time it takes for a signal to travel from your device to the server and back. It measures the round-trip time in milliseconds (ms), indicating the responsiveness of your connection.
-
Test results: Once the test is complete, Speedtest.net displays the results, including your download speed, upload speed, and ping. These results provide an indication of the quality and performance of your internet connection.
-
-
IP Scanner
An IP scanner is a network tool used to discover and map IP addresses and devices within a network. It helps identify active IP addresses, check connectivity, and gather information about network devices. IP scanners can be useful for network administrators, security professionals, and home users for various purposes, such as network monitoring, inventory management, and security assessments. Here are some key features and functionalities typically found in IP scanners:
-
IP Address Discovery: IP scanners can scan a range of IP addresses or an entire subnet to identify active IP addresses within a network. This helps determine the devices connected to the network and their corresponding IP addresses.
-
Device Identification: IP scanners can attempt to identify the type of device associated with an IP address by querying its MAC address or performing device fingerprinting. This information can help in network inventory management and troubleshooting.
-
Port Scanning: Some IP scanners include port scanning functionality, allowing users to check which ports are open and listening on network devices. This can be useful for identifying potential security vulnerabilities or detecting unauthorized services.
-
Ping Sweeping: IP scanners often use ping sweeping, which involves sending ICMP echo requests (ping) to multiple IP addresses to determine if they are reachable. This helps verify the connectivity and responsiveness of network devices.
-
Hostname Resolution: IP scanners may perform DNS lookups to resolve IP addresses into hostnames. This provides additional information about the devices and aids in network identification.
-
Subnet Analysis: IP scanners can analyze the subnet and provide details such as the subnet mask, network address, and broadcast address. This helps in understanding the network structure and IP allocation.
-
Reporting and Exporting: Many IP scanners offer reporting capabilities, allowing users to generate detailed reports of the scan results. Additionally, they may provide options to export the scan results in various formats like CSV or PDF for further analysis or documentation.
-
Customization and Filters: IP scanners often allow users to customize the scan parameters, such as specifying the IP range, timeout settings, and scan speed. They may also offer filters to exclude or include specific IP addresses or devices based on criteria like IP range, device type, or open ports.
Here is a list of commonly used network-related commands in the Windows command prompt (CMD) or PowerShell:
- ipconfig: Displays IP configuration information for all network interfaces on the local machine, including IP address, subnet mask, default gateway, and DNS servers.
- ping: Sends ICMP echo requests to a specified IP address or hostname to check connectivity and measure round-trip time (ping time).
- tracert (or traceroute): Traces the route taken by packets from the local machine to a destination IP address or hostname, showing the intermediate hops and their round-trip times.
- netstat: Displays active network connections, listening ports, and network statistics. Useful for troubleshooting network issues and monitoring network activity.
- nslookup: Performs DNS (Domain Name System) queries to retrieve information about IP addresses, hostnames, or other DNS records.
- route: Displays or modifies the local IP routing table, allowing you to add or remove routes to specific networks or hosts.
- arp: Displays and manages the ARP (Address Resolution Protocol) cache, which maps IP addresses to MAC addresses on the local network.
- nbtstat: Displays NetBIOS over TCP/IP (NetBT) protocol statistics and current connections. It is used for troubleshooting NetBIOS-related issues.
- net: Provides various network-related commands, including starting or stopping network services, managing network shares, and controlling network resources.
- telnet: Allows you to establish a Telnet connection to a remote host using the Telnet protocol. Telnet is typically used for testing connectivity to specific ports.
- ftp: Initiates an FTP (File Transfer Protocol) session with a remote server, allowing you to transfer files between the local machine and the remote server.
- netsh: A powerful command-line tool for configuring and managing various network settings, including IP addresses, firewall settings, network interfaces, and more.
- tracert6 (or traceroute6): Similar to tracert but specifically for IPv6 networks, it traces the route to an IPv6 destination and displays the intermediate hops.
- getmac: Retrieves the MAC (Media Access Control) addresses of network interfaces on the local machine.
- route print: Prints the current IP routing table on the local machine, displaying the network destinations, subnet masks, gateway addresses, and interface indexes.



![How To Activate Windows & Office [100% Solution]](https://ritnote.com/wp-content/uploads/2015/03/activator-copy.jpg)