Question

In: Computer Science

Q3.  Networking commands – ping, mount, hosts, netstat The ping command can be used to check the...

Q3.  Networking commands – ping, mount, hosts, netstat

  1. The ping command can be used to check the network working condition between two systems.  You may have to find the path name of the ping command file using which or whereis command and then type the full/absolute path name of the ping command.  Issue ping command with UNIX server IP address as argument.  If the command does not stop after displaying five packets transfer and receive information, terminate the command using ctrl-c.  Otherwise, the command may never stop.  
  2. The mount command without arguments will display the list of mounted local and network file systems on the UNIX system.  Find the path name of the mount command file using which or whereis command and then by typing the full/absolute path name of the mount command to display the list of mounted file systems.
  3. Change working directory to /etc.  The file fstab contains the list of file systems to be mounted when the system boots.  The file mnttab contains the actual list of file systems that are mounted.  Display file attributes and the content of these two files.
  4. The file named hosts in the /etc directory contains names of computers (hosts) and their corresponding IP addresses. The first name in the list is called the official name and the remaining names are called aliases.  Display the content of the hosts file.
  5. Look at the content of the hosts file displayed above, and then using echo command, answer what is the name of the UNIX server at FSU that you are using.

HINT: Remember the IP address of the UNIX server.

  1. The netstat command displays information about your network.  To test this command, start the DOS command line interface on your PC by running cmd command like you did before.  (1) Issue netstat command.  (2) Issue help ( ? ) when you are in netstate to see the various options it supports.  (3) Identify the option to display the routing table and then issue netstat with that option to display the routing table.  Copy and paste the output of netstat session from the DOS window into your file to be submitted. To exit from DOS window, type exitcommand after copying and pasting the output.

Solutions

Expert Solution

ping
*********

mount
********

netstat -r


if you have any doubt then please ask me without any hesitation in the comment section below , if you like my answer then please thumbs up for the answer , before giving thumbs down please discuss the question it may possible that we may understand the question different way and we can edit and change the answers if you argue, thanks :)


Related Solutions

PART 5: Learn about commands used to view contents of files: use the cat command to...
PART 5: Learn about commands used to view contents of files: use the cat command to review the contents of the /home/test/passwd.bak type:   cat passwd.bak 2. now add the |more to the last command (see what happens when you push the up arrow curser key-it recalls the last command) 3. now try to cat the passwd.bak file but look at the first few lines and then the last few lines using the head and tail commands type:  head passwd.bak   and    tail...
a.)Which of the following commands can be used to change the stateof a process,...
a.)Which of the following commands can be used to change the state of a process, including to stop a process?endkillstophaltb.)Responding to ping requests can leave a system vulnerable to which of the following?TCP wrappersDoS attacksMan-in-the-middle attacksAll of the abovec.)Which of the following is the de facto standard name resolution solution for the majority of systems connected to the Internet?DHCPLDAPDNSNISd.)DHCP stands for which of the following?Dynamic Host Configuration ProtocolDomain Host Configuration ProtocolDomain Host Configuration ProcessDynamic Host Configuration Processe.)After installing the correct...
Questions: Explain the following Linux commands Show your work examples/outcome. 1. command used to locate /Home/...
Questions: Explain the following Linux commands Show your work examples/outcome. 1. command used to locate /Home/ Directory…show the outcome 2. command used for October 2020 3. mv command and cat command 4. commands used- move to parent directory? 5. Explain why command is used ls -R?   What is the meaning of -R ? 6. Explain and describe two examples of how the touch command. 7. Explain what is the outcome of the commands ls -C ? 8. Explain command echo....
How this command used for and provide examples for each one. Commands: 1-file 2-find 3-pwd 4-ln...
How this command used for and provide examples for each one. Commands: 1-file 2-find 3-pwd 4-ln 5-stat 6- cmp, comm, and diff 7-md5sum 8-du 9-gzip 10-gunzip 11-bzip2, and bunzip 12-cpio 13-tar 14-wc 15-vi editor
2. Explain how the mesg, write, and wall commands can be used to allow users to...
2. Explain how the mesg, write, and wall commands can be used to allow users to talk to each other on UNIX
List the different sites that can be used to check a patient’s pulse. What are the...
List the different sites that can be used to check a patient’s pulse. What are the risks and benefits of checking the pulse at each site Please type
List the different sites that can be used to check a patient’s pulse. What are the...
List the different sites that can be used to check a patient’s pulse. What are the risks and benefits of checking the pulse at each site? (typed please)
Write a program in JAVA using the BigInteger library that can be used to check a...
Write a program in JAVA using the BigInteger library that can be used to check a RSA signature, based on the signer's RSA public key pair. To test your program, take the following information about a message Alice signed and use the verify signature to reproduce the message Alice signed and convert it back to String format. n = 68236588817658935156357212288430888402056854883696767622850112840388111129987 e = 65537 signature = 46612763171375975923246342580942010388414761162366281695045830390867474569531
Which expression can be used to check if an integer x is a multiple of 5...
Which expression can be used to check if an integer x is a multiple of 5 within the range 20 to 50 inclusively? Select one: a. (x >= 20 && x % 5 == 0) || (x <= 50 && x % 5 == 0) b. x <= 50 && x >= 20 && x % 5 == 0 c. 20 <= (x % 5) <= 50 d. (x % 5 == 0) && (20 <= x <= 50)
Q3) Explain; how the synchronization mechanism (semaphores) can be used, to ensure a correct access to...
Q3) Explain; how the synchronization mechanism (semaphores) can be used, to ensure a correct access to exclusive resources.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT