Time
3 hours 38 minutes
Difficulty
Beginner
CEU/CPE
2

Video Description

TCP/IP Characteristics and Tools

Video Transcription

00:00
Now let's practice. Let's
00:03
recognize some off the TCP I p tools Some of the TCP I p commence that helps in trouble shooting the network and in ah, determining the i p addresses off the machines and the domain names off the Web sites and so on.
00:22
Let's start by this command, its I p config. Let's try this command. Now, how do we try this command? I p config And what could be it could be its output.
00:35
I p config is used if we type it here on the command prompt. It
00:41
is used to determine the i p address the physical address that Gateway address the Summit Mosque and other addresses all the TCP i p configuration off the machine
00:56
If we type i p config
01:00
slash old
01:02
we get more configuration in details about the TCP I p configuration off all the Ethernet guards and the WiFi cords existing on a certain machine laptop or
01:15
ah, PC or any other machine that we need to know its i p address.
01:22
It's Gateway or its Deanna's that is resolving the meanings for it or its gateway. The router that is connected to this machine tow connect it to the Internet.
01:36
The second command that we need to know about is the Ping Command.
01:40
Ping Ping stands for packet Internet dropper. We can access the help of this command that manual of this command by typing King minus question mark,
01:52
here is the help. Here is the manual off this comment. For example, if I type now paying
01:59
www
02:01
not Yahoo
02:05
don't come.
02:06
I'm testing the connectivity between my machine and yahoo dot com. Either I get a reply, which means that I am connected or I get a request timed out that which means that I'm not connected to such machine
02:21
so I can typing
02:23
followed by an I p address and being followed by a domain name
02:30
I can typing for a domain name
02:35
followed by the switch minus T,
02:40
which means that I need a tow
02:43
execute and interrupted an uninterrupted ping
02:47
ping that goes on a
02:50
number off packets and sends to me the reply
02:54
until I press control, See to stop this operation here. I'm connected to google dot com and the request the ICMP request packets send by this command is replied by
03:08
the ICMP replying that is
03:13
appearing on the CME the screen.
03:16
I can specify the number of packet sent by my machine. Tow the distillation machine. I need to pink, for example. I can typing minus and six. Www dot google
03:30
not come, Which means I need only tow. Send six packets and see the reply. Only
03:37
here are two,
03:38
345
03:42
six and then it stops.
03:45
Ping has so many switches. If I need to know all the switches off the ping command and need to know more about them, I can typing minus question, Mark, and go on and see these switches and its usage and try to use them one by one.
04:04
The other command that I want you to know about is the argument our abstinence for address, resolution protocol. And as we have said before, our is the resolution protocol resolving the logical address into physical address resolving the i P address in tow. Mac, address
04:24
If I type r minus question Mark, I get the help or the manual off this command and can read the usage off this command,
04:33
the most popular usage is
04:36
using our minus A
04:39
to display the AARP cash off a certain machine here. We can have the Internet address
04:46
and the physical address corresponding to it that our store, the inside the AARP, cash off this machine and used for the resolution between the I. P and the physical address. This is a Mac address. This is an I P address. Both are used for the resolution
05:02
between logical and physical, and both are stored in the our cash off this machine,
05:10
our command once more,
05:12
can be used by several switches. You can have a look at our minus question mark to know the usages off such switches.
05:20
You can
05:23
make your machine act as an FTP client. If you type the command FTP,
05:30
then
05:31
you can type
05:33
open,
05:35
for example, ftp
05:38
dot Microsoft
05:41
not come
05:44
and then waits for the connection between your client machine and FTP that Microsoft dot com
05:49
It may ask you about
05:51
user name and password. If you supply them in a correct way, then you log in in tow. The ftp that Microsoft dot com
06:00
to do what
06:01
Toe download files from this FTP server to your client machine
06:06
toe. Get some files through the command, get
06:11
and then type the file name and you can upload some files through the command Put and then type the file names and buy this. You can upload some files from your machine, tow the server machine and you can type L s. Which means that you want to list their contents off the FTP server
06:30
that you are connected to
06:32
to end this
06:34
FTP session. You just typed by and then end this FTP session.
06:40
Another command that we need to know about is an ASL Look up
06:46
and as look up is a very useful command in determining the i p address corresponding to a certain domain name. For example, if I type here www dot google
06:57
don't come,
06:59
I can get
07:00
the I P addresses connecting corresponding toe google dot com
07:06
and connecting them. Tow my machine.
07:10
If I can type any
07:12
domain name, I can get the corresponding I p address and vice versa. If I can type an I p address, I can get the fully qualified domain name for this I P address toe exit from this command. I simply type exit. Another command that we need to know about is that state
07:30
not state
07:32
minus question. Mark shows the manual and the help of this command with many switches that can be used, that state is usedto display their current connections of any machine. For example, if I type Nets state minus and
07:48
I can see the machines that I'm connected toe
07:53
currently
07:54
through the I P address off my machine, the i p address off the foreign machine, the connection protocol and the status of this connection
08:01
I can also type that state minus A to display the same connections in the form off I P address on my machine domain name off the connected machine and the status of the connection.
08:15
That state is very useful in determining and in
08:22
ah specifying the connections that are connected to my machine in a certain
08:28
moment, off time
08:33
after this, after this
08:35
commands has been listed, we can go through them.
08:41
Here is the ping minus T minus and minus our miners w minus t for uninterrupted being Madison for specifying certain that number off packets My pink manners are
08:52
for the out count, and Pittman is W for the time outs but spanked them out. Here is the output off an arms cache of a certain machine using the art minus a command
09:03
here is using the FTP comment To connect to an FTP server, you can you use open a less CD bin, get em get put by These commands can be tried on the FTP session and as look up to resolve the D. N s into the
09:20
that the domain name in tow i p address Using the d n A system out. This command
09:28
is used to print the routing table for a certain machine
09:33
route print, for example, this place
09:37
the routing table for any machine that
09:39
I am connected to
09:43
displaced the routing table off the machine that
09:46
this command is typed on the routing table and its components has been previously explained. And this is a simple routing table that you can have a look on.
09:58
This is the destination network. This is the sub Net mosque, the gateway, the interface and the metric or the coast.
10:03
Just review the section speaking about the routing table, and you can see these columns as the components off the routing table.
10:13
Finally,
10:16
we come to the estate once Morgan estate minus eight in a state Manus and and that state Mon SP shows the connections with the name off the protocols that state minus p, for example, and then spasticity shows the connection's made through the TCP Protocol. Only
10:33
through this machine, where you type this comment.
10:37
Thank you.

Up Next

Network Fundamentals

In this basic Network Fundamentals course, you will get an introduction to basic networking concepts to expand your knowledge about network security. You will get a complete overview of networks including wired and wireless computer networks, devices, and protocols.

Instructed By

Instructor Profile Image
Mohammad Adly
EC3 Manager at Information Technology Institute
Instructor