0% found this document useful (0 votes)
13 views8 pages

CCN Exp1

The document outlines the Computer Communication Networks Laboratory course (ECL602) for TE E&TC students at A.C. Patil College of Engineering, detailing practical exercises focused on various LAN commands such as ping, traceroute, nslookup, ipconfig, arp, and netstat. Each command is explained with its purpose, usage, and conclusions drawn from the experiments. The document also includes an assessment methodology for evaluating student performance in the laboratory.

Uploaded by

Shruti Dhumal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views8 pages

CCN Exp1

The document outlines the Computer Communication Networks Laboratory course (ECL602) for TE E&TC students at A.C. Patil College of Engineering, detailing practical exercises focused on various LAN commands such as ping, traceroute, nslookup, ipconfig, arp, and netstat. Each command is explained with its purpose, usage, and conclusions drawn from the experiments. The document also includes an assessment methodology for evaluating student performance in the laboratory.

Uploaded by

Shruti Dhumal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

ECL602: Computer Communication Networks Laboratory, Class: TE E&TC

Jawahar Education Society’s


A. C. Patil College of Engineering
DEPARTMENT OF E&TC ENGINEERING
Academic Year 2024-25
Subject : Computer Communication
Networks Laboratory Practical In-charge : Prof. H. S. Badodekar
(ECL602)
Class: Batch: Roll-No : PRN NO.
Name : TE ( VI)

Date of Performance:- Date of Submission:-


Practical No. 01

Title To Study and Analyze Various LAN Commands

Demonstrate knowledge of programming for network


Course Outcome CO3
communications.

Assessment Methodology

Parameters for
Sr. No. Marks Remarks
Assessment Obtained
Practical
1 Performance Excellent Good Average
(04 Marks)
Write-up
2 Presentation Excellent Good Average
(04 Marks)
Write-up Viva
3 Excellent Good
(04 Marks) Average

Submission
4 Timely Late
(02 Marks)

Attendance
5 Present Absent
(01 Marks)
Total Marks (15 Marks)

Teachers Signature with date:-


ECL602: Computer Communication Networks Laboratory, Class: TE E&TC

Experiment No. 1
Using various LAN commands
Aim – To study and analyse various LAN commands
1) ping
Ping is a command-line utility, available on virtually any operating system with
network connectivity, that acts as a test to see if a networked device is reachable.
The ping command sends a request over the network to a specific device. A
successful ping results in a response from the computer that was pinged back to the
originating computer.
the ping command sends out an echo request. If it finds the target system, the remote
host sends back an echo reply. The distance (number of hops) to the remote system can be
determined from the reply, as well as the conditions in-between (packet loss and time to
respond). While the author of the ping utility said the name of the program was simply based
on the sound of sonar, others sometimes say that Ping is an acronym for Packet InterNet
Groper.
The Ping utility uses the echo request, and echo reply messages within the Internet
Control Message Protocol (ICMP), an integral part of any IP network. When a ping command
is issued, an echo request packet is sent to the address specified. When the remote host
receives the echo request, it responds with an echo reply packet.
By default, the ping command sends several echo requests, typically four or five. The
result of each echo request is displayed, showing whether the request received a successful
response, how many bytes were received in response, the Time to Live (TTL), and how long
the response took to receive, along with statistics about packet loss and round-trip times.

Conclusion –
So, by using the ping command we can find out the connectivity of our device with
another device and get to know is our device is connected to another device or not. It helps us
to verify the IP level connectivity.
ECL602: Computer Communication Networks Laboratory, Class: TE E&TC

2) traceRoute/Tracert
Traceroute uses ICMP’s Ping command to find out how many different devices are
between the computer initiating the traceroute and the target. This command works by
manipulating the packets time to live value or TTL. The TTL is the number of times the
packet can be rebroadcast by the next host encountered on the network or hops. The
command will start with a TTL value of 1 indicating the packet can only go as far as the next
device between the initiator and the target. The receiving device will send back an ICMP type
11, code 0 packet (time exceeded), and the packet is logged. The sender increases the TTL by
1 and sends the next series of packets. The packets will reach their expected time to live at
the next hop along the network; which in turn, causes the receiving router to send another
time exceeded reply. This continues until the target is reached, and all hops along the way
have been recorded, creating a listing of all devices between the initiating computer and the
target. This can be helpful for a penetration tester when determining what devices are on a
network. Windows platforms have a default TTL of 128, Linux platforms start with a TTL of
64, and Cisco networking devices have a whopPing TTL of 255.
The traceroute command in Windows is tracert. On a Linux system, like Kali, the
command is traceroute.

Conclusion –
By using the tracert/traceroute command we can find out how our device is connected
to the destination via different devices. We know that to reach the destination a packet travels
through various devices and the tracert/traceroute command shows the IP address of those
devices connected in-between your device and destination.
ECL602: Computer Communication Networks Laboratory, Class: TE E&TC

3) nslookup
The nslookup command queries internet domain name servers in two modes.
Interactive mode allows you to query name servers for information about various hosts and
domains, or to print a list of the hosts in a domain. In noninteractive mode, the names and
requested information are printed for a specified host or domain.
The nslookup command enters interactive mode when no arguments are given, or
when the first argument is a - (minus sign) and the second argument is the host name or
internet address of a name server. When no arguments are given, the command queries the
default name server. The nslookup command enters non-interactive mode when you give
the name or internet address of the host to be looked up as the first argument. The optional
second argument specifies the host name or address of a name server. You can specify
options on the command line if they precede the arguments and are prefixed with a hyphen.

Conclusion –
By using the nslookup command we can be able to find out the IP address of any website we
need. We know that every website has its own IP address but it is very difficult to memorize
all the IP address, to make this easy every website is given its own IP address. To find that
IP address or to find the website by IP address we can use the nslookup command.
ECL602: Computer Communication Networks Laboratory, Class: TE E&TC

4) ipconfig/ipconfig /all
ipconfig stands for Internet Protocol Configuration. This command is used to view all
the current TCP/IP network configurations values of the computer. The ipconfig command is
mainly used in Microsoft Windows operating system. But it is also supported by React OS
and Apple Mac OS. Some of the latest versions of the Linux OS also supports ipconfig.
It has to be taken under consideration that ipconfig command displays both the
enabled as well as the disabled configurations of networking devices that are currently
connected to the system. In the below screenshot, you can see the working of ipconfig
command on a Microsoft Windows PC.

Conclusion –
By using the ipconfig or ipconfig /all commands we can be able to see our IPv4 and
IPv6 address and other connectivity details. It shows all the TCP/IP network configurations
of the device. The command is used in almost every operating system. The main advantage of
the command is it shows all the configurations whether it is enabled or disabled.
ECL602: Computer Communication Networks Laboratory, Class: TE E&TC

5) arp
The arp command displays and modifies the Internet-to-adapter address translation
tables used by the address in Networks and Communication Management. The arp command
displays the current ARP entry for the host specified by the HostName variable. The host can
be specified by name or number, using Internet dotted decimal notation.
ARP Command is a TCP/IP utility and Microsoft Windows command for viewing
and modifying the local Address Resolution Protocol (ARP) cache, which contains recently
resolved MAC addresses of Internet Protocol hosts on the network. When one host on a
TCP/IP network wants to communicate with a second host, the first host begins by using the
ARP to resolve the IP address of the second host into its associated MAC address. The MAC
address is needed for communication to take place over the network.

Conclusion –
The arp command shows all the devices connected to our device in any LAN network.
The connection may be wired or wireless but the arp command shows the IP address of all
the devices connected to your device in any LAN.
ECL602: Computer Communication Networks Laboratory, Class: TE E&TC

6) netstat
The network statistics (netstat) command is a networking tool used for
troubleshooting and configuration, that can also serve as a monitoring tool for connections
over the network. Both incoming and outgoing connections, routing tables, port listening, and
usage statistics are common uses for this command. Let's take a look at some of the
basic usage for netstat and the most used cases.
Netstat command displays various network related information such as network
connections, routing tables, interface statistics, masquerade connections, multicast
memberships etc.
There are various ways to use the netstat command to find out different connections to
your device. In this experiment we have used the netstat -a command which shows all the
connections to your device.

Conclusion –
By using this command, we are able to see all the devices connected to your device
with the help of their IP address. In the above image we can see the list of devices along with
their foreign address and state of connection.
ECL602: Computer Communication Networks Laboratory, Class: TE E&TC

7) Public IP
A public IP address is an IPv4 address that is reachable from the internet. If a resource
in your tenancy needs to be directly reachable from the internet, it must have a public IP
address. Depending on the type of resource, there might be other requirements.
Certain types of resources in your tenancy are designed to be directly reachable from
the internet and therefore automatically come with a public IP address. For example: a NAT
gateway or a public load balancer. Other types of resources are directly reachable only if you
configure them to be. For example: instances in your VCN.
The main difference between public and private IP addresses is how far they reach,
and what they’re connected to. A public IP address identifies you to the wider internet so that
all the information you’re searching for can find you. A private IP address is used within a
private network to connect securely to other devices within that same network.

Conclusion –
We can see the public IP in any browser we have just we have to enter whats my IP
and your browser will show the public IP on it.

Conclusion –
In this experiment we saw how to use various commands with the help of command
prompt in our device. We saw the use of ping, arp, nslookup, ipconfig, netstat and tracert. We
also saw how to see your public IP address on any browser. We also saw the brief about all
the commands which we used in this experiment and learned how to use them.

You might also like