Network Administration: An In-Depth DOS Commands Review

Verified

Added on  2023/04/22

|12
|1027
|264
Homework Assignment
AI Summary
This assignment provides a comprehensive review of essential DOS commands utilized by network administrators, including IPCONFIG, PING, TRACERT, NETSTAT, and NSLOOKUP. It details the functionality of each command, explaining how they are used to monitor network configurations, test connectivity, trace network paths, display network connections, and query domain name systems. The review includes practical examples and screenshots to illustrate the application of each command, highlighting important features such as IP addresses, subnet masks, gateways, DNS servers, TTL, and network connection statistics. The assignment also addresses potential security implications and ethical considerations associated with using these commands. Desklib offers a platform for students to access similar solved assignments and study tools.
Document Page
Running head: DOS COMMANDS REVIEW
DOS COMMANDS REVIEW
(Name)
(Tutor’s Name)
(Unit Title)
(Date)
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
DOS COMMANDS REVIEW 2
Introduction
This paper will highlight some of the commands which network administrator ought to
familiarize themselves with so to constantly monitor an organization’s network
IPCONFIG command
An IP address is one of the features displayed by the IPCONFIG command. IP address is
part of TCP/IP protocols as it allows one to get online. SN Mask is a number which defines a
range of IP addresses which can be used in a certain network. SN mask is used to designate
subnets or sub-networks and to limit traffic between multiple network traffic. An example of SN
Mask is 255.255.255.0 which is a class IP address.
DNS is another feature which is associated with Ipconfig as shown by figure one above.
It is defined as a de-centralized naming system for services, computers and other resources
which are connected to the internet. Gateway is the last feature viewed in the ipconfig command.
The major aim of the gateway is to translate one protocol into another. Others displayed by
IPCONFIG command are Ethernet adapter, wireless LAN adapter, and tunnel adapter teredo
tunneling pseudo-interface (Matthews, 2007).
Figure 1: IP Config
Document Page
DOS COMMANDS REVIEW 3
PING command
PING command is another DOS command line tool which is widely used by network
administrators. The command is used to test the ability of a certain user computer to reach a
certain destination. Example as shown by figure 2 where the command is used test if my user
computer is able to reach onto www.google.com. The command has sent four packets as the
time taken is between 34 ms and 68ms.
Document Page
DOS COMMANDS REVIEW 4
Figure 2: PING command
From figure two one of the features with ping command is the Time To Live (TTL). This
is the value in Internet Protocol packet which tells a certain network router either the packet is
too long or it should be discarded. Packets get lost when a packet fails to reach the required
destination.
Figure three shows the IP address of phsc.edu which is 23.185.0.1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
DOS COMMANDS REVIEW 5
Figure 3: phsc.edu IP address
TRACERT command
From the figure, my router is 192.168.42.129 all the way to www.google.com which
has the public IP address of 216.58.223.68. There are ten devices which are owned by ISP. Some
of the links are slower due to their content; if a site contains pictures and videos the site has to be
slower
As shown by Figure four TRACERT utility is used by network administrators to show
the path taken by a certain packet from a user computer to the destination that one specifies. The
TRACERT command is also referred to as the traceroute command.
Document Page
DOS COMMANDS REVIEW 6
Figure 4: TRACERT command
Figure 5: TRACERT command in use
Document Page
DOS COMMANDS REVIEW 7
Figure 6: TRACING www.Google.com
NETSTAT command
This is a command which is used to display information on how a device
communicates with the other network devices or computers. The command shows the details of
network connections. Netstat command is used by network administrators to show the lists of all
ports which are open
As shown by the figure seven and eight netstat command is used to show internet and
network connections. Netstat –b displays all the executable which are involved when creating
each of the listening port. The information displayed by netstat is very important to the network
security team since it shows a list of all the active TCP connections
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
DOS COMMANDS REVIEW 8
Figure 7: NETSTAT command
Figure 9: NETSTAT –b command
Document Page
DOS COMMANDS REVIEW 9
Figure 10: Nestat –b command
NSLOOKUP command
This is another command available for network administrators. The command is
utilized network administrators so as to query the Domain Name System so as to obtain an
Internet Protocol address and the exact domain name. (Blanc & Cotton, 2014)
Figure 11: NSLOOK-up command
Document Page
DOS COMMANDS REVIEW 10
The reason as to why there is multiple IP addresses associated with one domain name
is because the configuration in each of the network assigns to a different Domain Name Server
for an IP address lookup which can lead to multiple IP addresses. Also, multiple IP addresses are
associated with a single domain due to load balancing requests sent google so as to increase
response time and availability. Nslookup is able to query the third party for the three IP address
highlighted in figure 11 as it is able to identify the DNS server which is currently configured to
three IP addresses. Someone can use NSlookup command in an unethical manner to steal
information and files from devices. An IP address and domain name or an IP address are
registered with ICANN which is an accredited registrar. In here the registrar usually checks for
domain names which are available so as to create a WHOIS record (Blanc & Cotton, 2014).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
DOS COMMANDS REVIEW 11
Other two commands
Other commands which can be used by network administrators are pathping which is
used together with TRACERT and GETMAC is another command which is used to show the
physical address (Kurose & Ross, 2017).
References
Document Page
DOS COMMANDS REVIEW 12
Beal, V. (2018). Ipconfig. Retrieved from Embracing Digital Transformation:
https://www.webopedia.com/TERM/I/ipconfig.html
Blanc, R. P., & Cotton, I. W. (2014). Computer networking by Robert P Blanc .
Kurose, J. F., & Ross, K. W. (2017). Computer networking : a top-down approach. Boston.
Matthews, J. (2007). Computer networking : Internet protocols in action (1st edition ed.). New
York: Springer.
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]