TCP/IP and Network Troubleshooting

Verified

Added on  2023/05/28

|6
|734
|230
AI Summary
This guide covers cable types, commonly used Linux troubleshooting commands, and questions for network troubleshooting. It is suitable for IT students and professionals.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: TPI/IP AND NETWORK TROUBLESHOOTING
TPI/IP AND NETWORK TROUBLESHOOTING
Name of the Student
Name of the University
Author Note:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
2TPI/IP AND NETWORK TROUBLESHOOTING
Table of Contents
Question 1........................................................................................................................................3
Question 2........................................................................................................................................4
Question 3........................................................................................................................................5
References........................................................................................................................................6
Document Page
3TPI/IP AND NETWORK TROUBLESHOOTING
Question 1
Cable Type Pros Cons Application
STP( Shielded
Twisted Pair)
The shielding helps
to protect the signals
which are present on
the cable from
external interferences
(Comer, 2018). It can
support higher
transmission rate.
The potential
performance increase
is not worthy due to
the indulgence of
more cost relating to
other cables. The
installation time of
the cable is also long.
The cable is often
used in data network
for medium and short
length connections.
UTP (Unshielded
Twisted Pair)
The main pros are
related to the easy
installation as they
have smaller overall
diameter.
Prone to EMI
(Electro Magnetic
interferences)
The application is
majorly done in
networking cable
Coaxial cable The cost of the cable
is very much less and
is also less
susceptible to noise
or interferences (EMI
or RFI)
One of the main
concern in the cable
is the security as it
can be easily tapped
by breaking it and
inserting T-joint in
between.
The Coaxial cable is
used in the
transmission line for
the signal relating to
radio transmitter.
SMF (Single Mode The main advantage It can be considered Application is seen in
Document Page
4TPI/IP AND NETWORK TROUBLESHOOTING
Fiber) in the sector is related
to the retaining of the
fidelity of each light
pulse over large
distance and exhibit
no dispersion which
is caused by multi-
mode fibers.
as costly as compared
to other cables
(Ahammad, 2018).
Installation factor can
be one of the concern
areas.
long distance
communication with
security factor
included into the
sector.
Question 2
Two commonly used native Linux troubleshooting commands
Dig: Domain Information Groper
Telnet: Connects destination host
Troubleshooting command with use
Traceroute: It is a command which can be used in the network troubleshooting which
would be showing the number of hops which are taken to reach the destination.
Netstat: It can be implemented in the domain of the identification of routing table
problem and connection info so as to check the overall network.
DiG (Domain information groper): This command can be used in the sector of
troubleshooting in the DNS related query.
ARP command: The command can be used in the sector of viewing the security aspect in
the Kernel ARP table.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
5TPI/IP AND NETWORK TROUBLESHOOTING
Ethtool: This tool can be stated as a replacement of the mii-tool. The command can be
used in the sector of setting of speed and duplex of the network interface.
Question 3
There can be different forms of questions which can be asked in the sector of the detection of the
problem and getting into the severity of the problem (Ma et al., 2016). Some of the common
questions which can be stated in the context are stated below:
What is the main problem area which is seen in the sector of operation of the network?
What was the system condition when the problem had occurred?
Is the connection between the different terminals still exist?
Is the IP address which is linked to the connection very much secured from different
activity of intruder?
Is the safety of the data which prevail in the system is taken care off?
Document Page
6TPI/IP AND NETWORK TROUBLESHOOTING
References
Ahammad, S. (2018). Linux basic and networking using CISCO and mikrotik (Doctoral
dissertation, Daffodil International University).
Comer, D. E. (2018). The Internet book: everything you need to know about computer
networking and how the Internet works. Chapman and Hall/CRC.
Ma, H., Liu, L., Zhou, A., & Zhao, D. (2016). On networking of internet of things: Explorations
and challenges. IEEE Internet of Things Journal, 3(4), 441-452.
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]