Question

In: Computer Science

4. Identify the tool is used with the netstat command to view a system's routing table?...

4. Identify the tool is used with the netstat command to view a system's routing table? Run the identified command and highlight the output of the command with an appropriate result and discussion.

Solutions

Expert Solution

With the help of netstat command, a user can troubleshoot and configure the network. It also works as a monitoring tool for connections over the network. User can find incoming and outgoing connections, port listening, routing tables and usage statistics of a network.

For the example, i am using centos 7.4 Linux OS. Below are the commands we can use in netstat

netstat -a

With this command we can list all listening ports (both TCP and UDP) Below is the output screenshot

Result shows all the listening and established connections by both TCP and UDP ports.

Proto field is for the protocol (TCP or UDP)

Recv-Q is for the received requests and Send-Q is for sending requests

Local address is the port of the service and the ip assigned to it. for localhost it is 0.0.0.0 or localhost

foreign address with which the communication is happening with port and ip

State is the State of connection (whether it is Listening or Established)

Hope this will help you.


Related Solutions

Chapter 7 describes four routing metrics used by dynamic routing protocols to calculate their routing. Suggest...
Chapter 7 describes four routing metrics used by dynamic routing protocols to calculate their routing. Suggest a new metric or a change in those metrics, aimed at improving the routing calculations . Base your suggestion on two resources from LIRN.
PART 5: Learn about commands used to view contents of files: use the cat command to...
PART 5: Learn about commands used to view contents of files: use the cat command to review the contents of the /home/test/passwd.bak type:   cat passwd.bak 2. now add the |more to the last command (see what happens when you push the up arrow curser key-it recalls the last command) 3. now try to cat the passwd.bak file but look at the first few lines and then the last few lines using the head and tail commands type:  head passwd.bak   and    tail...
                      Contact Manager COMMAND MENU ---------------------------------------------------------- list - Display all contacts view - View
                      Contact Manager COMMAND MENU ---------------------------------------------------------- list - Display all contacts view - View a contact add - Add a contact del - Delete a contact exit - Exit program Command: list 1. Tom van Rossum 2. Edward Idle Command: view Number: 2 Name: Edward Idle Email: [email protected] Phone: +44 20 7946 0958 Command: add Name: John Smith Email: [email protected] Phone: 559-123-4567 John Smith was added. Command: list 1. Tom van Rossum 2. Edward Idle 3. John Smith Command: exit...
your own words, describe how routing tables are used, include their properties and routing protocols. your...
your own words, describe how routing tables are used, include their properties and routing protocols. your own words, describe what multicast processing is. What does the MAC Address look like? Discuss the 2 main methods the switch uses to process these, include thoughts on when you would use the various processing methods. your own words Discuss in detail why would you want to configure a network using a Virtual Local Area network (VLAN)? What are the potential drawbacks?
What is the command to view the process? What is a zombie process & What is...
What is the command to view the process? What is a zombie process & What is the command to take care of zombie process?
Open the Command Prompt window and use the nslookup command to identify the domain names that...
Open the Command Prompt window and use the nslookup command to identify the domain names that correspond to the following IP addresses: 161.170.244.20 205.251.242.103 144.160.155.43 Use the Command Prompt window and nslookup command to identify the IP addresses that correspond to the following domain names: walmart.com amazon.com att.com Close the Command Prompt window. Submit your findings.
The Modified Puls method is used for reservoir routing while the Muskingum method is used for...
The Modified Puls method is used for reservoir routing while the Muskingum method is used for river routing. Discuss the problems that would occur if one tried to use the Modified Puls method for river routing (i.e. why isn’t the Modified Puls method well suited for river routing?).
1. What command is used to change the current working directory at the command line?
1. What command is used to change the current working directory at the command line?
Answer the questions and Identify the table that should be used for each of the following...
Answer the questions and Identify the table that should be used for each of the following situations in the space provided, then show the calculations to solve the problem below. FV – Future Value of 1 PV – Present Value of 1 FVA – Future Value of an Annuity PVA – Present Value of an Annuity __________ 5. An investment firm has determined that the market price of a 5-year $100,000 bond yielding 6% is $104,212. This is based on...
In your view why are taxes and tradable permits preferred to command and control policies.
In your view why are taxes and tradable permits preferred to command and control policies.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT