SlideShare a Scribd company logo
1 of 2
Download to read offline
1)Please explain the commands ifconfig, ping, traceroute, netstat, dig, nslookup, route, host,
hostname.
2). Explain briefly about TCP/IP and its Protocol Architecture.
3) Explain the difference between TCP/IP Protocol stack and OSI model.
Solution
Answer:
1) Ipconfig
Ipconfig is an MS-DOS utility that can be used from MS-DOS and an MS-DOS shell to display
the network settings currently assigned and given by a network. This command can be utilized to
verify a network connection as well as to verify your network settings.
Ping
Ping is one of the most commonly used network commands that allows you to ping another
network IP address. Pinging another address helps determine if the network card can
communicate within the local network or outside network.
Netstat
The netstat command is used to display the TCP/IP network protocol statistics and information.
Nslookup
The nslookup MS-DOS utility that enables a user to do a reverse lookup on an IP address of a
domain or host on a network.
Route
The route MS-DOS utility enables computers to view and modify the computer's route table.
traceroute
The tracert command in MS-DOS and Windows (known as traceroute in Unix-like operating
systems) is a useful tool for diagnosing network issues. It allows you to view a listing of how a
network packet travels through the network and where it may fail or slow down. Using this
information you can determine the computer, router, switch or other network device possibly
causing your network issues.
host
solves a host name into an Internet Protocol (IP) address or an IP address into a host name.
the hostname command is used to show or set a computer's host name and domain name. It is
one of the most basic of the network administrative utilities.
A host name is a name that is assigned to a host (i.e., a computer connected to the network) that
uniquely identifies it on a network and thus allows it to be addressed without using its full IP
address. Domain names are user-friendly substitutes for numeric IP addresses.
The basic syntax for the hostname command is
hostname [options] [new_host_name]
2)TCP/IP protocols map to a four-layer conceptual model known as the DARPA model , named
after the U.S. government agency that initially developed TCP/IP. The four layers of the DARPA
model are: Application, Transport, Internet, and Network Interface. Each layer in the DARPA
model corresponds to one or more layers of the seven-layer Open Systems Interconnection (OSI)
model.
Network Interface Layer
The Network Interface layer (also called the Network Access layer) is responsible for placing
TCP/IP packets on the network medium and receiving TCP/IP packets off the network medium.
TCP/IP was designed to be independent of the network access method, frame format, and
medium. In this way, TCP/IP can be used to connect differing network types. These include
LAN technologies such as Ethernet and Token Ring and WAN technologies such as X.25 and
Frame Relay. Independence from any specific network technology gives TCP/IP the ability to be
adapted to new technologies such as Asynchronous Transfer Mode (ATM).
Internet Layer
The Internet layer is responsible for addressing, packaging, and routing functions. The core
protocols of the Internet layer are IP, ARP, ICMP, and IGMP.
Transport Layer
The Transport layer (also known as the Host-to-Host Transport layer) is responsible for
providing the Application layer with session and datagram communication services. The core
protocols of the Transport layer are Transmission Control Protocol (TCP) and the User Datagram
Protocol (UDP).
Application Layer
The Application layer provides applications the ability to access the services of the other layers
and defines the protocols that applications use to exchange data. There are many Application
layer protocols and new protocols are always being developed.
The most widely-known Application layer protocols are those used for the exchange of user
information:
3) Differences

More Related Content

Similar to 1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf

Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesSerious_SamSoul
 
Tcp and introduction to protocol
Tcp and introduction to protocolTcp and introduction to protocol
Tcp and introduction to protocolSripati Mahapatra
 
Tcpandintroductiontoprotocol 150618054958-lva1-app6892
Tcpandintroductiontoprotocol 150618054958-lva1-app6892Tcpandintroductiontoprotocol 150618054958-lva1-app6892
Tcpandintroductiontoprotocol 150618054958-lva1-app6892Saumendra Pradhan
 
Networking Fundamentals
Networking Fundamentals Networking Fundamentals
Networking Fundamentals Vikas Gupta
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocolsRaja Waseem Akhtar
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networkingisma ishak
 
TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.rp5373568
 
Network architecture
Network architectureNetwork architecture
Network architecturecsk selva
 
Presentation on network_protocols
Presentation on network_protocolsPresentation on network_protocols
Presentation on network_protocolsIUBAT
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam SinghShivam Singh
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfskknowledge
 

Similar to 1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf (20)

Iap final
Iap finalIap final
Iap final
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
 
Tcp and introduction to protocol
Tcp and introduction to protocolTcp and introduction to protocol
Tcp and introduction to protocol
 
Tcpandintroductiontoprotocol 150618054958-lva1-app6892
Tcpandintroductiontoprotocol 150618054958-lva1-app6892Tcpandintroductiontoprotocol 150618054958-lva1-app6892
Tcpandintroductiontoprotocol 150618054958-lva1-app6892
 
Cisco doc
Cisco docCisco doc
Cisco doc
 
Networking Fundamentals
Networking Fundamentals Networking Fundamentals
Networking Fundamentals
 
Hardware9
Hardware9Hardware9
Hardware9
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocols
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
 
Mcse question
Mcse questionMcse question
Mcse question
 
TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Ta 104-tcp
Ta 104-tcpTa 104-tcp
Ta 104-tcp
 
Presentation on network_protocols
Presentation on network_protocolsPresentation on network_protocols
Presentation on network_protocols
 
Avani
AvaniAvani
Avani
 
TCP/IP Modal
TCP/IP ModalTCP/IP Modal
TCP/IP Modal
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam Singh
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdf
 

More from eyebolloptics

How does law enforcement, courts and corrections work to complemen.pdf
How does law enforcement, courts and corrections work to complemen.pdfHow does law enforcement, courts and corrections work to complemen.pdf
How does law enforcement, courts and corrections work to complemen.pdfeyebolloptics
 
Check all that apply to different sets of genes that are homologous..pdf
Check all that apply to different sets of genes that are homologous..pdfCheck all that apply to different sets of genes that are homologous..pdf
Check all that apply to different sets of genes that are homologous..pdfeyebolloptics
 
For the following matrices, determine a cot of basis vectors for the.pdf
For the following matrices, determine a cot of basis vectors for  the.pdfFor the following matrices, determine a cot of basis vectors for  the.pdf
For the following matrices, determine a cot of basis vectors for the.pdfeyebolloptics
 
Exploring Organizational Culture Research the ITT Tech Virtual Lib.pdf
Exploring Organizational Culture Research the ITT Tech Virtual Lib.pdfExploring Organizational Culture Research the ITT Tech Virtual Lib.pdf
Exploring Organizational Culture Research the ITT Tech Virtual Lib.pdfeyebolloptics
 
Can you help me write these functions in C I do not need the main f.pdf
Can you help me write these functions in C I do not need the main f.pdfCan you help me write these functions in C I do not need the main f.pdf
Can you help me write these functions in C I do not need the main f.pdfeyebolloptics
 
Drag the term or statement to the correct column SolutionC.pdf
Drag the term or statement to the correct column  SolutionC.pdfDrag the term or statement to the correct column  SolutionC.pdf
Drag the term or statement to the correct column SolutionC.pdfeyebolloptics
 
Define the labor relations processSolutionThe labor relations.pdf
Define the labor relations processSolutionThe labor relations.pdfDefine the labor relations processSolutionThe labor relations.pdf
Define the labor relations processSolutionThe labor relations.pdfeyebolloptics
 
Accounting 5205Solution Depreciation aims to recognize in the.pdf
Accounting 5205Solution Depreciation aims to recognize in the.pdfAccounting 5205Solution Depreciation aims to recognize in the.pdf
Accounting 5205Solution Depreciation aims to recognize in the.pdfeyebolloptics
 
Aiom for the ADT List. C++ Explain what this pseudocode is doing.a.pdf
Aiom for the ADT List. C++ Explain what this pseudocode is doing.a.pdfAiom for the ADT List. C++ Explain what this pseudocode is doing.a.pdf
Aiom for the ADT List. C++ Explain what this pseudocode is doing.a.pdfeyebolloptics
 
an encryption scheme distributes randomly over the Ascii characters .pdf
an encryption scheme distributes randomly over the Ascii characters .pdfan encryption scheme distributes randomly over the Ascii characters .pdf
an encryption scheme distributes randomly over the Ascii characters .pdfeyebolloptics
 
A class has 40 students aged 17 to 34. What is the probabilty that a.pdf
A class has 40 students aged 17 to 34. What is the probabilty that a.pdfA class has 40 students aged 17 to 34. What is the probabilty that a.pdf
A class has 40 students aged 17 to 34. What is the probabilty that a.pdfeyebolloptics
 
A microbial geneticist isolates a new mutation in E. coli and wishes.pdf
A microbial geneticist isolates a new mutation in E. coli and wishes.pdfA microbial geneticist isolates a new mutation in E. coli and wishes.pdf
A microbial geneticist isolates a new mutation in E. coli and wishes.pdfeyebolloptics
 
30. The vouching of recorded payables to supporting documentation wil.pdf
30. The vouching of recorded payables to supporting documentation wil.pdf30. The vouching of recorded payables to supporting documentation wil.pdf
30. The vouching of recorded payables to supporting documentation wil.pdfeyebolloptics
 
3. Observe that every cation was initially part of a nitrate compound.pdf
3. Observe that every cation was initially part of a nitrate compound.pdf3. Observe that every cation was initially part of a nitrate compound.pdf
3. Observe that every cation was initially part of a nitrate compound.pdfeyebolloptics
 
At what point does commercialization start to create inequality Ple.pdf
At what point does commercialization start to create inequality Ple.pdfAt what point does commercialization start to create inequality Ple.pdf
At what point does commercialization start to create inequality Ple.pdfeyebolloptics
 
A benefit of an activity received by people not participating in the.pdf
A benefit of an activity received by people not participating in the.pdfA benefit of an activity received by people not participating in the.pdf
A benefit of an activity received by people not participating in the.pdfeyebolloptics
 
You are given a specification for some Java classes as follows.  A.pdf
You are given a specification for some Java classes as follows.  A.pdfYou are given a specification for some Java classes as follows.  A.pdf
You are given a specification for some Java classes as follows.  A.pdfeyebolloptics
 
8. Would the following cell have a spontaneous reaction Explain. .pdf
8. Would the following cell have a spontaneous reaction Explain. .pdf8. Would the following cell have a spontaneous reaction Explain. .pdf
8. Would the following cell have a spontaneous reaction Explain. .pdfeyebolloptics
 
Write a command to find out how many users in etcpasswd have the l.pdf
Write a command to find out how many users in etcpasswd have the l.pdfWrite a command to find out how many users in etcpasswd have the l.pdf
Write a command to find out how many users in etcpasswd have the l.pdfeyebolloptics
 
Write a program that mimics the operations of several vending machin.pdf
Write a program that mimics the operations of several vending machin.pdfWrite a program that mimics the operations of several vending machin.pdf
Write a program that mimics the operations of several vending machin.pdfeyebolloptics
 

More from eyebolloptics (20)

How does law enforcement, courts and corrections work to complemen.pdf
How does law enforcement, courts and corrections work to complemen.pdfHow does law enforcement, courts and corrections work to complemen.pdf
How does law enforcement, courts and corrections work to complemen.pdf
 
Check all that apply to different sets of genes that are homologous..pdf
Check all that apply to different sets of genes that are homologous..pdfCheck all that apply to different sets of genes that are homologous..pdf
Check all that apply to different sets of genes that are homologous..pdf
 
For the following matrices, determine a cot of basis vectors for the.pdf
For the following matrices, determine a cot of basis vectors for  the.pdfFor the following matrices, determine a cot of basis vectors for  the.pdf
For the following matrices, determine a cot of basis vectors for the.pdf
 
Exploring Organizational Culture Research the ITT Tech Virtual Lib.pdf
Exploring Organizational Culture Research the ITT Tech Virtual Lib.pdfExploring Organizational Culture Research the ITT Tech Virtual Lib.pdf
Exploring Organizational Culture Research the ITT Tech Virtual Lib.pdf
 
Can you help me write these functions in C I do not need the main f.pdf
Can you help me write these functions in C I do not need the main f.pdfCan you help me write these functions in C I do not need the main f.pdf
Can you help me write these functions in C I do not need the main f.pdf
 
Drag the term or statement to the correct column SolutionC.pdf
Drag the term or statement to the correct column  SolutionC.pdfDrag the term or statement to the correct column  SolutionC.pdf
Drag the term or statement to the correct column SolutionC.pdf
 
Define the labor relations processSolutionThe labor relations.pdf
Define the labor relations processSolutionThe labor relations.pdfDefine the labor relations processSolutionThe labor relations.pdf
Define the labor relations processSolutionThe labor relations.pdf
 
Accounting 5205Solution Depreciation aims to recognize in the.pdf
Accounting 5205Solution Depreciation aims to recognize in the.pdfAccounting 5205Solution Depreciation aims to recognize in the.pdf
Accounting 5205Solution Depreciation aims to recognize in the.pdf
 
Aiom for the ADT List. C++ Explain what this pseudocode is doing.a.pdf
Aiom for the ADT List. C++ Explain what this pseudocode is doing.a.pdfAiom for the ADT List. C++ Explain what this pseudocode is doing.a.pdf
Aiom for the ADT List. C++ Explain what this pseudocode is doing.a.pdf
 
an encryption scheme distributes randomly over the Ascii characters .pdf
an encryption scheme distributes randomly over the Ascii characters .pdfan encryption scheme distributes randomly over the Ascii characters .pdf
an encryption scheme distributes randomly over the Ascii characters .pdf
 
A class has 40 students aged 17 to 34. What is the probabilty that a.pdf
A class has 40 students aged 17 to 34. What is the probabilty that a.pdfA class has 40 students aged 17 to 34. What is the probabilty that a.pdf
A class has 40 students aged 17 to 34. What is the probabilty that a.pdf
 
A microbial geneticist isolates a new mutation in E. coli and wishes.pdf
A microbial geneticist isolates a new mutation in E. coli and wishes.pdfA microbial geneticist isolates a new mutation in E. coli and wishes.pdf
A microbial geneticist isolates a new mutation in E. coli and wishes.pdf
 
30. The vouching of recorded payables to supporting documentation wil.pdf
30. The vouching of recorded payables to supporting documentation wil.pdf30. The vouching of recorded payables to supporting documentation wil.pdf
30. The vouching of recorded payables to supporting documentation wil.pdf
 
3. Observe that every cation was initially part of a nitrate compound.pdf
3. Observe that every cation was initially part of a nitrate compound.pdf3. Observe that every cation was initially part of a nitrate compound.pdf
3. Observe that every cation was initially part of a nitrate compound.pdf
 
At what point does commercialization start to create inequality Ple.pdf
At what point does commercialization start to create inequality Ple.pdfAt what point does commercialization start to create inequality Ple.pdf
At what point does commercialization start to create inequality Ple.pdf
 
A benefit of an activity received by people not participating in the.pdf
A benefit of an activity received by people not participating in the.pdfA benefit of an activity received by people not participating in the.pdf
A benefit of an activity received by people not participating in the.pdf
 
You are given a specification for some Java classes as follows.  A.pdf
You are given a specification for some Java classes as follows.  A.pdfYou are given a specification for some Java classes as follows.  A.pdf
You are given a specification for some Java classes as follows.  A.pdf
 
8. Would the following cell have a spontaneous reaction Explain. .pdf
8. Would the following cell have a spontaneous reaction Explain. .pdf8. Would the following cell have a spontaneous reaction Explain. .pdf
8. Would the following cell have a spontaneous reaction Explain. .pdf
 
Write a command to find out how many users in etcpasswd have the l.pdf
Write a command to find out how many users in etcpasswd have the l.pdfWrite a command to find out how many users in etcpasswd have the l.pdf
Write a command to find out how many users in etcpasswd have the l.pdf
 
Write a program that mimics the operations of several vending machin.pdf
Write a program that mimics the operations of several vending machin.pdfWrite a program that mimics the operations of several vending machin.pdf
Write a program that mimics the operations of several vending machin.pdf
 

Recently uploaded

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Recently uploaded (20)

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf

  • 1. 1)Please explain the commands ifconfig, ping, traceroute, netstat, dig, nslookup, route, host, hostname. 2). Explain briefly about TCP/IP and its Protocol Architecture. 3) Explain the difference between TCP/IP Protocol stack and OSI model. Solution Answer: 1) Ipconfig Ipconfig is an MS-DOS utility that can be used from MS-DOS and an MS-DOS shell to display the network settings currently assigned and given by a network. This command can be utilized to verify a network connection as well as to verify your network settings. Ping Ping is one of the most commonly used network commands that allows you to ping another network IP address. Pinging another address helps determine if the network card can communicate within the local network or outside network. Netstat The netstat command is used to display the TCP/IP network protocol statistics and information. Nslookup The nslookup MS-DOS utility that enables a user to do a reverse lookup on an IP address of a domain or host on a network. Route The route MS-DOS utility enables computers to view and modify the computer's route table. traceroute The tracert command in MS-DOS and Windows (known as traceroute in Unix-like operating systems) is a useful tool for diagnosing network issues. It allows you to view a listing of how a network packet travels through the network and where it may fail or slow down. Using this information you can determine the computer, router, switch or other network device possibly causing your network issues. host solves a host name into an Internet Protocol (IP) address or an IP address into a host name. the hostname command is used to show or set a computer's host name and domain name. It is one of the most basic of the network administrative utilities.
  • 2. A host name is a name that is assigned to a host (i.e., a computer connected to the network) that uniquely identifies it on a network and thus allows it to be addressed without using its full IP address. Domain names are user-friendly substitutes for numeric IP addresses. The basic syntax for the hostname command is hostname [options] [new_host_name] 2)TCP/IP protocols map to a four-layer conceptual model known as the DARPA model , named after the U.S. government agency that initially developed TCP/IP. The four layers of the DARPA model are: Application, Transport, Internet, and Network Interface. Each layer in the DARPA model corresponds to one or more layers of the seven-layer Open Systems Interconnection (OSI) model. Network Interface Layer The Network Interface layer (also called the Network Access layer) is responsible for placing TCP/IP packets on the network medium and receiving TCP/IP packets off the network medium. TCP/IP was designed to be independent of the network access method, frame format, and medium. In this way, TCP/IP can be used to connect differing network types. These include LAN technologies such as Ethernet and Token Ring and WAN technologies such as X.25 and Frame Relay. Independence from any specific network technology gives TCP/IP the ability to be adapted to new technologies such as Asynchronous Transfer Mode (ATM). Internet Layer The Internet layer is responsible for addressing, packaging, and routing functions. The core protocols of the Internet layer are IP, ARP, ICMP, and IGMP. Transport Layer The Transport layer (also known as the Host-to-Host Transport layer) is responsible for providing the Application layer with session and datagram communication services. The core protocols of the Transport layer are Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP). Application Layer The Application layer provides applications the ability to access the services of the other layers and defines the protocols that applications use to exchange data. There are many Application layer protocols and new protocols are always being developed. The most widely-known Application layer protocols are those used for the exchange of user information: 3) Differences