SlideShare a Scribd company logo
2
Most read
1)Please explain the commands ifconfig, ping, traceroute, netstat, dig, nslookup, route, host,
hostname.
2). Explain briefly about TCP/IP and its Protocol Architecture.
3) Explain the difference between TCP/IP Protocol stack and OSI model.
Solution
Answer:
1) Ipconfig
Ipconfig is an MS-DOS utility that can be used from MS-DOS and an MS-DOS shell to display
the network settings currently assigned and given by a network. This command can be utilized to
verify a network connection as well as to verify your network settings.
Ping
Ping is one of the most commonly used network commands that allows you to ping another
network IP address. Pinging another address helps determine if the network card can
communicate within the local network or outside network.
Netstat
The netstat command is used to display the TCP/IP network protocol statistics and information.
Nslookup
The nslookup MS-DOS utility that enables a user to do a reverse lookup on an IP address of a
domain or host on a network.
Route
The route MS-DOS utility enables computers to view and modify the computer's route table.
traceroute
The tracert command in MS-DOS and Windows (known as traceroute in Unix-like operating
systems) is a useful tool for diagnosing network issues. It allows you to view a listing of how a
network packet travels through the network and where it may fail or slow down. Using this
information you can determine the computer, router, switch or other network device possibly
causing your network issues.
host
solves a host name into an Internet Protocol (IP) address or an IP address into a host name.
the hostname command is used to show or set a computer's host name and domain name. It is
one of the most basic of the network administrative utilities.
A host name is a name that is assigned to a host (i.e., a computer connected to the network) that
uniquely identifies it on a network and thus allows it to be addressed without using its full IP
address. Domain names are user-friendly substitutes for numeric IP addresses.
The basic syntax for the hostname command is
hostname [options] [new_host_name]
2)TCP/IP protocols map to a four-layer conceptual model known as the DARPA model , named
after the U.S. government agency that initially developed TCP/IP. The four layers of the DARPA
model are: Application, Transport, Internet, and Network Interface. Each layer in the DARPA
model corresponds to one or more layers of the seven-layer Open Systems Interconnection (OSI)
model.
Network Interface Layer
The Network Interface layer (also called the Network Access layer) is responsible for placing
TCP/IP packets on the network medium and receiving TCP/IP packets off the network medium.
TCP/IP was designed to be independent of the network access method, frame format, and
medium. In this way, TCP/IP can be used to connect differing network types. These include
LAN technologies such as Ethernet and Token Ring and WAN technologies such as X.25 and
Frame Relay. Independence from any specific network technology gives TCP/IP the ability to be
adapted to new technologies such as Asynchronous Transfer Mode (ATM).
Internet Layer
The Internet layer is responsible for addressing, packaging, and routing functions. The core
protocols of the Internet layer are IP, ARP, ICMP, and IGMP.
Transport Layer
The Transport layer (also known as the Host-to-Host Transport layer) is responsible for
providing the Application layer with session and datagram communication services. The core
protocols of the Transport layer are Transmission Control Protocol (TCP) and the User Datagram
Protocol (UDP).
Application Layer
The Application layer provides applications the ability to access the services of the other layers
and defines the protocols that applications use to exchange data. There are many Application
layer protocols and new protocols are always being developed.
The most widely-known Application layer protocols are those used for the exchange of user
information:
3) Differences

More Related Content

PDF
COC to-manage-and-monitor-the-network.pdf
PPTX
TCP/IP Protocol Architeture
PDF
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
PPT
Chapter 9 TCP IP Reference Model.ppt
PPT
Chapter 9 TCP IP Reference Model.ppt
PPTX
New tcp-ip model
PPTX
New tcp-ip model (2)
COC to-manage-and-monitor-the-network.pdf
TCP/IP Protocol Architeture
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
Chapter 9 TCP IP Reference Model.ppt
Chapter 9 TCP IP Reference Model.ppt
New tcp-ip model
New tcp-ip model (2)

Similar to 1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf (20)

PDF
4. Communication and Network Security
PPTX
Networking fundamentals
PPT
Tcp ip
PPTX
Ch4 Protocols.pptx
PPT
Internetbasics
PDF
CCNA project-report
PDF
Module 1 slides
PPTX
Introduction and Physical Layer_OSI_Layer.pptx
PPT
07 - TCP_IP and the DoD Model.ppt
PPTX
TCP/IP model
PPT
presentation on TCP/IP protocols data comunications
PDF
53426980 tcp-ip
PPT
ipbasics.ppt
PPTX
PPT
Chapter04 -- network protocols
PPTX
PPTX
Лекц 7
PPTX
Ch4 Protocols.pptx
PPTX
TCP/IP Protocols
PPTX
linux unit 4 (2).pptxjiy8t7r7iguyguyy888
4. Communication and Network Security
Networking fundamentals
Tcp ip
Ch4 Protocols.pptx
Internetbasics
CCNA project-report
Module 1 slides
Introduction and Physical Layer_OSI_Layer.pptx
07 - TCP_IP and the DoD Model.ppt
TCP/IP model
presentation on TCP/IP protocols data comunications
53426980 tcp-ip
ipbasics.ppt
Chapter04 -- network protocols
Лекц 7
Ch4 Protocols.pptx
TCP/IP Protocols
linux unit 4 (2).pptxjiy8t7r7iguyguyy888
Ad

More from eyebolloptics (20)

PDF
How does law enforcement, courts and corrections work to complemen.pdf
PDF
Check all that apply to different sets of genes that are homologous..pdf
PDF
For the following matrices, determine a cot of basis vectors for the.pdf
PDF
Exploring Organizational Culture Research the ITT Tech Virtual Lib.pdf
PDF
Can you help me write these functions in C I do not need the main f.pdf
PDF
Drag the term or statement to the correct column SolutionC.pdf
PDF
Define the labor relations processSolutionThe labor relations.pdf
PDF
Accounting 5205Solution Depreciation aims to recognize in the.pdf
PDF
Aiom for the ADT List. C++ Explain what this pseudocode is doing.a.pdf
PDF
an encryption scheme distributes randomly over the Ascii characters .pdf
PDF
A class has 40 students aged 17 to 34. What is the probabilty that a.pdf
PDF
A microbial geneticist isolates a new mutation in E. coli and wishes.pdf
PDF
30. The vouching of recorded payables to supporting documentation wil.pdf
PDF
3. Observe that every cation was initially part of a nitrate compound.pdf
PDF
At what point does commercialization start to create inequality Ple.pdf
PDF
A benefit of an activity received by people not participating in the.pdf
PDF
You are given a specification for some Java classes as follows.  A.pdf
PDF
8. Would the following cell have a spontaneous reaction Explain. .pdf
PDF
Write a command to find out how many users in etcpasswd have the l.pdf
PDF
Write a program that mimics the operations of several vending machin.pdf
How does law enforcement, courts and corrections work to complemen.pdf
Check all that apply to different sets of genes that are homologous..pdf
For the following matrices, determine a cot of basis vectors for the.pdf
Exploring Organizational Culture Research the ITT Tech Virtual Lib.pdf
Can you help me write these functions in C I do not need the main f.pdf
Drag the term or statement to the correct column SolutionC.pdf
Define the labor relations processSolutionThe labor relations.pdf
Accounting 5205Solution Depreciation aims to recognize in the.pdf
Aiom for the ADT List. C++ Explain what this pseudocode is doing.a.pdf
an encryption scheme distributes randomly over the Ascii characters .pdf
A class has 40 students aged 17 to 34. What is the probabilty that a.pdf
A microbial geneticist isolates a new mutation in E. coli and wishes.pdf
30. The vouching of recorded payables to supporting documentation wil.pdf
3. Observe that every cation was initially part of a nitrate compound.pdf
At what point does commercialization start to create inequality Ple.pdf
A benefit of an activity received by people not participating in the.pdf
You are given a specification for some Java classes as follows.  A.pdf
8. Would the following cell have a spontaneous reaction Explain. .pdf
Write a command to find out how many users in etcpasswd have the l.pdf
Write a program that mimics the operations of several vending machin.pdf
Ad

Recently uploaded (20)

PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
RMMM.pdf make it easy to upload and study
PDF
Classroom Observation Tools for Teachers
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Lesson notes of climatology university.
PDF
Complications of Minimal Access Surgery at WLH
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
GDM (1) (1).pptx small presentation for students
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
2.FourierTransform-ShortQuestionswithAnswers.pdf
Final Presentation General Medicine 03-08-2024.pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
RMMM.pdf make it easy to upload and study
Classroom Observation Tools for Teachers
Microbial disease of the cardiovascular and lymphatic systems
FourierSeries-QuestionsWithAnswers(Part-A).pdf
VCE English Exam - Section C Student Revision Booklet
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Supply Chain Operations Speaking Notes -ICLT Program
Lesson notes of climatology university.
Complications of Minimal Access Surgery at WLH
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Anesthesia in Laparoscopic Surgery in India
GDM (1) (1).pptx small presentation for students
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...

1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf

  • 1. 1)Please explain the commands ifconfig, ping, traceroute, netstat, dig, nslookup, route, host, hostname. 2). Explain briefly about TCP/IP and its Protocol Architecture. 3) Explain the difference between TCP/IP Protocol stack and OSI model. Solution Answer: 1) Ipconfig Ipconfig is an MS-DOS utility that can be used from MS-DOS and an MS-DOS shell to display the network settings currently assigned and given by a network. This command can be utilized to verify a network connection as well as to verify your network settings. Ping Ping is one of the most commonly used network commands that allows you to ping another network IP address. Pinging another address helps determine if the network card can communicate within the local network or outside network. Netstat The netstat command is used to display the TCP/IP network protocol statistics and information. Nslookup The nslookup MS-DOS utility that enables a user to do a reverse lookup on an IP address of a domain or host on a network. Route The route MS-DOS utility enables computers to view and modify the computer's route table. traceroute The tracert command in MS-DOS and Windows (known as traceroute in Unix-like operating systems) is a useful tool for diagnosing network issues. It allows you to view a listing of how a network packet travels through the network and where it may fail or slow down. Using this information you can determine the computer, router, switch or other network device possibly causing your network issues. host solves a host name into an Internet Protocol (IP) address or an IP address into a host name. the hostname command is used to show or set a computer's host name and domain name. It is one of the most basic of the network administrative utilities.
  • 2. A host name is a name that is assigned to a host (i.e., a computer connected to the network) that uniquely identifies it on a network and thus allows it to be addressed without using its full IP address. Domain names are user-friendly substitutes for numeric IP addresses. The basic syntax for the hostname command is hostname [options] [new_host_name] 2)TCP/IP protocols map to a four-layer conceptual model known as the DARPA model , named after the U.S. government agency that initially developed TCP/IP. The four layers of the DARPA model are: Application, Transport, Internet, and Network Interface. Each layer in the DARPA model corresponds to one or more layers of the seven-layer Open Systems Interconnection (OSI) model. Network Interface Layer The Network Interface layer (also called the Network Access layer) is responsible for placing TCP/IP packets on the network medium and receiving TCP/IP packets off the network medium. TCP/IP was designed to be independent of the network access method, frame format, and medium. In this way, TCP/IP can be used to connect differing network types. These include LAN technologies such as Ethernet and Token Ring and WAN technologies such as X.25 and Frame Relay. Independence from any specific network technology gives TCP/IP the ability to be adapted to new technologies such as Asynchronous Transfer Mode (ATM). Internet Layer The Internet layer is responsible for addressing, packaging, and routing functions. The core protocols of the Internet layer are IP, ARP, ICMP, and IGMP. Transport Layer The Transport layer (also known as the Host-to-Host Transport layer) is responsible for providing the Application layer with session and datagram communication services. The core protocols of the Transport layer are Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP). Application Layer The Application layer provides applications the ability to access the services of the other layers and defines the protocols that applications use to exchange data. There are many Application layer protocols and new protocols are always being developed. The most widely-known Application layer protocols are those used for the exchange of user information: 3) Differences