4220_JonathanCine_lab_TCPIP Command
.docx
keyboard_arrow_up
School
Florida Atlantic University *
*We aren’t endorsed by this school
Course
4220
Subject
Computer Science
Date
Dec 6, 2023
Type
docx
Pages
7
Uploaded by JudgeLeopardMaster963
ISM4220, ISM6225
Lab Assignment 2. TCP/IP Command
DELIVERABLE
Electronic file: 4220_yourname_lab_TCPIP Command.doc
Submit your file(s) through Canvas before the due date. Late submission penalty will be applied.
Project 1: Using the ‘ipconfig’ Command The TCP/IP command used to test communication over IP to another host via sending out an echo request
is ping. Ping Verifies IP-level connectivity to another TCP/IP computer by sending Internet Control
Message Protocol (ICMP) Echo Request messages. The receipt of corresponding Echo Reply messages
are displayed, along with round-trip times. Ping is the primary TCP/IP command used to troubleshoot
connectivity, reachability, and name resolution.
1.
First obtain the TCP/IP configuration of a computer by opening Command Prompt, and then
typing ‘ipconfig.’ 2.
This time, type ‘ipconfig /all’ 3.
Fill out the following blanks by finding the information about a network you are using. Physical address (MAC address): EC-2E-98-51-5B-23
that's the address embedded in your network card, analogous to your VIN on your car.
IP address: 10.13.229.141
the IP address is changeable, unlike the MAC address.
Subnet Mask address: 255.255.2240
the subnet mask number tells your computer whether it is located on a subnetwork, a part of a larger network.
Default Gateway: 10.13.224.5 That's the computer or router that connect to the rest of the world, outside your subnet or LAN.
IP address of the DHCP server: 131.91.129.19 That's the computer that issues IP addresses to any computer that is powered up.
When was the lease for the IP address obtained: Monday, September 4, 2023 2:49:51 AM
When will the lease expire: Thursday September 7, 2023 5:15:44 PM
For Mac Users, how to open Terminal on Mac. Instead of Command Prompt, you need to run Terminal on your Mac laptop for this project.
The Terminal app is in the Utilities folder in Applications. To open it, open your Finder, and then
Applications folder, then open Utilities and double-click on Terminal.
Project 2: Using the ‘ping’ Command Copyright © 2020. May not be copied, scanned, or posted, in whole or in part, except for use with the written permission.
ISM4220, ISM6225
1.
Type ‘ipconfig.’ From the display of the ipconfig command, ensure that the network adapter for
the TCP/IP configuration you are testing is not in a Media disconnected state.
2.
At the command prompt, ping the loopback address by typing ‘ping yahoo.com.’ What is IP
address of www.yahoo.com
? Please find the IP address from the result of Ping command. Take a
screenshot of result and paste it here.
3.
You can use ping to test both the computer name and the IP address of the computer. If pinging
the IP address is successful, but pinging the computer name is not, you might have a name
resolution problem. In this case, ensure that the computer name you are specifying can be
resolved through the local Hosts file, by using Domain Name System (DNS) queries, or through
NetBIOS name resolution techniques. 4.
Ping the IP address of www.yahoo.com
, the answer of Q1. (ex. Ping 192.111.1.1). Take a
screenshot of result and paste it here.
Copyright © 2020. May not be copied, scanned, or posted, in whole or in part, except for use with the written permission.
ISM4220, ISM6225
5.
Ping yahoo.com -4. Take a screenshot of result and paste it here.
Ping the IP address of a remote host (a host that is on a different subnet). If the ping command fails,
verify that the remote host IP address is correct, that the remote host is operational, and that all of
the gateways (routers) between this computer and the remote host are operational.
Copyright © 2020. May not be copied, scanned, or posted, in whole or in part, except for use with the written permission.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Given the following commands, explain what the purpose of the command is and give a typical use case for each:
Show interface
Show arp
tracert
Example: the “ping” command, uses the Internet Control Message Protocol and verifies layer 3 connectivity, and would typically be used by a Network Administrator who wants to test connectivity between devices when a new device has been added to a network or as a troubleshooting method when experiencing connectivity issues.
arrow_forward
Given the following commands, explain what the purpose of the command is and give a typical use case for each:
Show interface
Show arp
tracert
Example: the “ping” command, uses the Internet Control Message Protocol and verifies layer 3 connectivity, and would typically be used by a Network Administrator who wants to test connectivity between devices when a new device has been added to a network or as a troubleshooting method when experiencing connectivity issues.
arrow_forward
Given the following commands, explain what the purpose of the command is and give a typical use case for each:
Show interface
Show arp
tracert
Example: the “ping” command, uses the Internet Control Message Protocol and verifies layer 3 connectivity, and would typically be used by a Network Administrator who wants to test connectivity between devices when a new device has been added to a network or as a troubleshooting method when experiencing connectivity issues.
arrow_forward
IL
PCAP Scanner
alert udp any 61348 -> any any (content: "109 69 63 61 6e 68 61 7a 69 70 03 63 6f 6d 001;
msg: "DNS Test"; Sid:1000001)
Question Number
2
Scan
The scan results for your snort rule will be displayed below.
There is a problem with your rule. Check the alerts below to determine what went wrong and
then try again.
Something went wrong with your snort rule. Check the Syntax
Syntax error please help!
Create a rule to detect DNS requests to
'icanhazip', then test the rule with the
scanner and submit the token.
O
X
arrow_forward
Find the attached file.
arrow_forward
Using the photo provided, what are the following answers
MAC Destination Address:MAC Source Address:MAC Type (Length):IP Version #:IP Header Length:IP Type of Service:IP Total Length:IP Identification:IP Fragment Flag|Offset:IP Time-to-live:IP Next Protocol:IP Header Checksum:IP Source address:IP Destination address:TCP source port:TCP destination port:TCP Sequence number:TCP Acknowledgement number:TCP Window size:TCP Checksum:
arrow_forward
Q4: A: Explain the operation of the FTP protocol using a flowchart.
arrow_forward
RootDC
Replica
Part#1: Create a script to promote the forest Root DC
READ:
o Be sure to Use a unique Domain name(pinacolada)and a
network ID of 210.168.25.0
o The scripts must be hands off, meaning that all commands to
promote the Domain Controllers must be in the script.
arrow_forward
You've configured a URL filtering profile and want to ensure that it logs traffic that
matches your profile but does not take further action. What action is this?
alert
block
continue
allow
arrow_forward
Ansible playbook 294 question
arrow_forward
Computer Science
Using a for loop, create a ping sweep that records all the IPv4 addresses on your home subnet. You may not use nmap in your code.
This is supposed to be a bash script btw.
arrow_forward
html or asp --- 6
arrow_forward
QUESTION 22
The session_start () function in PHP does the following:
DA. starts a session automatically
OB. looks for a PHPSESSID cookie on the user's hard drive first
DC. starts a session if there is no PHPSESSID cookie
D. automatically creates a PHPSESSID first
E. writes the session variables on the user's hard drive
F. creates a PHPSESSID if there isn't one and writes it as a cookie on the user's hard drive
G. reads the PHPSESSID cookie value if there is already a session started
QUESTION 23
Session data:
A. is stored on the users hard drive only
OB. is stored on the servers hard drive
C. is available until the user closes the browser
D. b and c
QUESTION 24
the session_start() function in php does the following:
A starts a session automatically first thing
B. looks for a PHPSESSID cookie on the users hard drive first
C. starts a session if there is no PHPSESSID cookie on the users hard drive
D. creates a value for the PHPSESSID first
E. writes the session variables on the users hard…
arrow_forward
DHCP Snapshot
File Action View Help
DE
Y DHCP
fbwdc01.frozenbug.com
IPV4
Scope [172.16.2.0] West Staff
Address Pool
Address Leases
Reservations
Scope Options
Policies
Server Options
Policies
Filters
IPV6
How many scopes are created in the
mentioned DHCP console?
One
None
Three
Two
>
arrow_forward
QUESTION 22
The session_start () function in PHP does the following:
DA. starts a session automatically
OB. looks for a PHPSESSID cookie on the user's hard drive first
C. starts a session if there is no PHPSESSID cookie
D. automatically crctites a PHPSESSID first
E. writes the session variables on the user's hard drive
OF. creates a PHPSESSID if there isn't one and writes it as a cookie on the user's hard drive
OG. reads the PHPSESSID cookie value if there is already a session started
QUESTION 24
the session_start() function in php does the following:
CA. starts a session automatically first thing
B. looks for a PHPSESSID cookie on the users hard drive first
OC. starts a session if there is no PHPSESSID cookie on the users hard drive
D. creates a value for the PHPSESSID first
E. writes the session variables on the users hard drive
OF. creates a PHPSESSID if there isn't one and writes it as a cookie on the users hard drive
G. reads the PHPSESSID cookie value if there is already a…
arrow_forward
@ wrong And plagiarism contents will downvoted
Write the methodology involved in computing the keys in SSL/TLS protocol.
arrow_forward
What is the output of the following command? Get-DnsServerTrustAnchor –name secure.practicelabs.com –computername PLABDC01
Updates the trust points created earlier on the PLABDC01
Creates a new trust point on the PLABDC01
Refreshes the trust point on all DNS servers
Creates a new trust point on all DNS servers from PLABDC01
arrow_forward
dont post irrelevant and copied from other account answers
posting 5th time
surely report and dislikeeee
arrow_forward
Clipboard
Font
Paragraph
UPLOAD BLOCKED We ran into a problem with this file. and can't save any new changes.Please
Styles
Save a Copy
Answer
Q.7. Find the network first IP address of the given IP address (167.33.21.123).
Answer
arrow_forward
UDP Task
In the program explained during the lab, in the client side
The OS assigns the port number automatically.
The client sends a line of characters (data) from its keyboard to server.
Update the client side of program so that it takes 2 arguments
The port it will bind to.
The message that will be sent to the server.
Keep the server side of program as it is
Use the screenshots in the presentation as a reference
check the testArg.py --> an example to show you how to use arguments
TCP Task
In the program explained during the lab
the client sends only 1 message to server ‘hello from tcp client’
server responds with the uppercase message.
Update the program / make a simple chat program so that
Client can send/receive multiple messages to server.
A special exit message is used to disconnect ‘Exit’.
Each time client sends a message, server responds with a confirmation of receiving it and its length
(use the screenshots in the presentation as a reference)…
arrow_forward
UDP Task
In the program explained during the lab, in the client side
The OS assigns the port number automatically.
The client sends a line of characters (data) from its keyboard to server.
Update the client side of program so that it takes 2 arguments
The port it will bind to.
The message that will be sent to the server.
Keep the server side of program as it is
Use the screenshots in the presentation as a reference
check the testArg.py --> an example to show you how to use arguments
TCP Task
In the program explained during the lab
the client sends only 1 message to server ‘hello from tcp client’
server responds with the uppercase message.
Update the program / make a simple chat program so that
Client can send/receive multiple messages to server.
A special exit message is used to disconnect ‘Exit’.
Each time client sends a message, server responds with a confirmation of receiving it and its length
(use the screenshots in the presentation as a reference)…
arrow_forward
please give right answers do not use other webiste and chatgpt for this answer its giving wring answers all time please also this webiste allow exert answer 3 question i am asking only 2 question please 9 10 answer correctly
arrow_forward
ents
try
You are planning trip to South America and and are worried about your devices with private keys
being stolen. So you decide to store your bitcoins in an address that allows you to redeem them
using only a password that you know. So, you send some bitcoins to the following ScriptPubKey:
33167ee681d8 is the SHA1 hash of your
O
arrow_forward
A symbolic link is also known as a soft link and is depicted by an @ symbol appearingat the beginning of the filename when viewed using the ls –l command. True or False?
arrow_forward
only answeres no explanation required
please don't copy other answers that are wrong
arrow_forward
Hands-On Project 9-4
In this project you will work with cookies that stores the fastest time to complete a sliding block puzzle.
Much of the code for the puzzle has already been written. Your task is to write the code that records
the user's best time and stores it within a persistent cookie with a 90-day lifetime.
To complete this task you will have to load your project onto a web server placed on a remote site or
installed on your own computer. If you need to install your own server, you can download free server
software like XAMPP from the web or you can use software supplied by your instructor.
NOTE: If you are unable to get access to a server, you can complete this project using local web
storage by modifying the steps to store data in the localStorage object rather than in a cookie.
Hands-on Project 9-4
Sliding Eight Puzzle
Arrange the blocks in numeric order from 1 to 8. To move a block into the blank space, click a block
adjacent to the space. Click the Start button to scramble…
arrow_forward
Question Completion Status:
QUESTION 6
The IPv6 has
O options
O header checksum
O fragmentation
anycast address
feature, which is not in IPv4.
arrow_forward
Back Story
What is our domain name?
Security.local
Can you ping our domain name?
Yes
If you cannot ping the domain name (which you should be able to, you most likely have a DNS issue). So let’s check that.
Opening command prompt in elevated privilege type and record the following output.
Ipconfig /all
*Do you see DNS servers? If not – type this:
Ipconfig /flushdns – this will release current DNS info
Ipconfig /registerdns – this will reregister DNS info
*Do you see DNS servers? If not – type this:
Ipconfig /renew – this will ‘re-ask’ the DHCP server for your DNS information
Then double check with:
Ipconfig /all
Do you see IPv4 DNS servers now?
Yes
Of course a reboot will work, but when you are troubleshooting DNS or DHCP you don’t want to reboot each time you try something.
Once you can ping security.local you can add your computer to the domain.
Other things to note – as you move from desktop support to administration, it’s important to…
arrow_forward
When a URL contains a "?" followed by a key value pair, what is this called?
String
JSON
Query String
Parameters
Network configurations can easily be migrated from data centers to the cloud because:
Internet standards are the same throughout the world
None of these response options
All cloud providers have adopted the same networking constructs and standards
Networking devices have standard configurations that can be exported and re-used in new devices
What is a Blue/Green deployment?
A deployment model running two identical productions at any time, only one of which is live and serving production traffic
A method of comparing two versions of an application against each other to determine which performs better
A deployment method that takes resources out of stack, deploys the new changes, and brings it back
A deployment pattern for rolling out releases to a subset of systems
Which migration strategy should be used to quickly move an application from local a data center to the cloud?
W…
arrow_forward
Vendor: The Apache Software Foundation Versions Affected: Apache OpenMeetings from 2.0.0 before 7.0.0 Description: Attacker can elevate their privileges in any room. https://lists.apache.org/thread/r9vn12dp5yofn1h3wd5x4h7c3vmmr5d9 How does this vulnerability jeopardize the system? What is the cause of this vulnerability? What are the countermeasures of this vulnerability? Be sure to provide the links of the materials that you found on the internet.
arrow_forward
While handling a session.cookie_lifetime is set to 4800, the cookie will live until _____.
arrow_forward
create a domain name (it should be the name of any group member) with the help of bind installation ubuntu
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,
Related Questions
- Given the following commands, explain what the purpose of the command is and give a typical use case for each: Show interface Show arp tracert Example: the “ping” command, uses the Internet Control Message Protocol and verifies layer 3 connectivity, and would typically be used by a Network Administrator who wants to test connectivity between devices when a new device has been added to a network or as a troubleshooting method when experiencing connectivity issues.arrow_forwardGiven the following commands, explain what the purpose of the command is and give a typical use case for each: Show interface Show arp tracert Example: the “ping” command, uses the Internet Control Message Protocol and verifies layer 3 connectivity, and would typically be used by a Network Administrator who wants to test connectivity between devices when a new device has been added to a network or as a troubleshooting method when experiencing connectivity issues.arrow_forwardGiven the following commands, explain what the purpose of the command is and give a typical use case for each: Show interface Show arp tracert Example: the “ping” command, uses the Internet Control Message Protocol and verifies layer 3 connectivity, and would typically be used by a Network Administrator who wants to test connectivity between devices when a new device has been added to a network or as a troubleshooting method when experiencing connectivity issues.arrow_forward
- IL PCAP Scanner alert udp any 61348 -> any any (content: "109 69 63 61 6e 68 61 7a 69 70 03 63 6f 6d 001; msg: "DNS Test"; Sid:1000001) Question Number 2 Scan The scan results for your snort rule will be displayed below. There is a problem with your rule. Check the alerts below to determine what went wrong and then try again. Something went wrong with your snort rule. Check the Syntax Syntax error please help! Create a rule to detect DNS requests to 'icanhazip', then test the rule with the scanner and submit the token. O Xarrow_forwardFind the attached file.arrow_forwardUsing the photo provided, what are the following answers MAC Destination Address:MAC Source Address:MAC Type (Length):IP Version #:IP Header Length:IP Type of Service:IP Total Length:IP Identification:IP Fragment Flag|Offset:IP Time-to-live:IP Next Protocol:IP Header Checksum:IP Source address:IP Destination address:TCP source port:TCP destination port:TCP Sequence number:TCP Acknowledgement number:TCP Window size:TCP Checksum:arrow_forward
- Q4: A: Explain the operation of the FTP protocol using a flowchart.arrow_forwardRootDC Replica Part#1: Create a script to promote the forest Root DC READ: o Be sure to Use a unique Domain name(pinacolada)and a network ID of 210.168.25.0 o The scripts must be hands off, meaning that all commands to promote the Domain Controllers must be in the script.arrow_forwardYou've configured a URL filtering profile and want to ensure that it logs traffic that matches your profile but does not take further action. What action is this? alert block continue allowarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- A+ Guide To It Technical SupportComputer ScienceISBN:9780357108291Author:ANDREWS, Jean.Publisher:Cengage,
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,