Ping Case Study

Decent Essays
Assessment Task 1
Part A:
Describe software diagnostic tools for single-user and multi-user computer operating systems.
1. Ping: A ping is a network utility program which checks if the computer is connected to any server or not. It is a diagnostic tool to know the connectivity of a computer.

a. Function and Operation of Ping
Function
Ping is used to check the network connectivity of the computer and allows the user to verify the particular IP address.

Operation
For the operation of Ping, Firstly open command prompt or type ‘cmd’ in search and press enter, then after type ping/(your IP address) for example ping/192.168.1.1 and press enter.

b. Ping is used in both single user as well as multi user operating system

c. The factors influencing
…show more content…
Ipconfig: It is a command line tool which is used to control the network connection and has three main commands, ‘all, release, and renew’.

a. Function and Operation of Ipconfig
Function
The function of Ipconfig is that it gathers and displays all the data regarding TCP/IP configuration values and refreshes Dynamic Host Configuration Protocol (DHCP)and Domain Name System (DNS) and then displays the IP address, subnet mask, and default getaway of the system.

Operation
Basically there are three main types of commands in Ipconfig which are all, release, and renew and the functions are to
Firstly go to and Press in Command prompt or type ‘cmd’ in search and press enter.
Type Ipconfig/all which will show all the IP address, Sub Net Mask, Mac address, Default Getaway, DHCP server, DNS and other details of the computer and its network.

Type Ipconfig/release which will drop all the current IP address and terminate the active TCP/IP connections.

TypeIpconfig/renew which will renew and obtain theIP address for the network adapter that relies on DHCP server

b. Ipconfig is used in both Single and Multi user Operating System.

c. The factors influencing the selection of Ipconfig are its simplicity to check the whole Network problems and deal with it using simple networking

Related Documents

  • Decent Essays

    QUES 1. A router has the following CIDR entries in the routing table: Address/Mask Next Hop 135.46.56.0/22 Interface 0 135.46.60.0/22 Interface 1 192.53.40.0/23 Router 1 Default Router 2 For each of the following IP addresses, what does the router do if a packet with that address arrives? 1. 135.46.63.10 2.…

    • 607 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    The congestion control makes sure that everyone across a network has a "fair" amount of access to network resources, at any given time Open loop congestion control methods vs Closed Loop congestion control Open loop tries to prevent congestion produced in a good design and close loop congestion monitor the system to detect congestion, pass this information to where action can be taken, and adjust system operation to correct…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Interrupts are most important as they give user the better control over the computer. Without interrupts, a user have to wait for a given task to complete in a specific time management with the higher priotity. This ensures that the CPU will charge the process immediately. 2. What is a trap?…

    • 681 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 1 Term Paper

    • 455 Words
    • 2 Pages

    5.2.3Direct Access DirectAccess is new to the Windows 7 operating systems. DirectAccess enables a remote user to work on their corporate network when they are away from the office without the need of a VPN. As long as the remote user is connected to the Internet, DirectAccess will automatically connect the remote user to the corporate network without the need of any user intervention.…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Internet Connectivity – Wide range of Internet connectivity should be considered based on the size of the company. Wired and Wireless connections should be arranged with high frequency range. Network…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Attackers exploiting default configurations to gain access to the network and to information stored on devices in the network are major threat to home gateway devices. In order to mitigate this threat there are many common default configurations a user should change. When setting up a home network, a user should make sure to change the default passwords. They should set up a strong account password and wifi password using best practices. The user should use a strong security protocol such as WPA2 instead of the default WEP which is not secure.…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    1. How would you determine the university’s Internet Protocol (IP) address range? a. Log in to university workstation either from any computer on campus or by creating a VPN in my PC and connecting to passport.missouristate.edu. b. Run the ipconfig command to analyze the IP address and subnet that gives the addressing schema for the network. 2.…

    • 648 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    THE DEFERENCES OF HANDLING SOCKET AND SERVERSOCKET First of all what is a socket? A socket is the one end –point of two-way communication link between two programs running over the network. This means the programs run on different computers, usually referred as the local and the remote computer.…

    • 1130 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Task 2 Describe in detail the OSI model and its each layers responsibility in detail for networking. Application – The application layer is used to enable the user to access the network. This is the only layer in the OSI model that directly interacts with the end user. This layer enables the user to surf the web or transfer files.…

    • 546 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The purpose of the internet layer is to organise or handle the movement of data on network. The meaning of movement of data is routing of data over the network. The main protocol used in the internet layer is IP (internet protocol), however ICMP (Internet control message protocol) and IGMP (Internet group management protocol) are also used in the internet…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    After this, a data packet is typically forwarded, to reach its destination node. Then, it directs the packet to the next station (network) on its journey by using information in its routing table/routing policy. This creates an overlay internetwork.…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Assignment

    • 867 Words
    • 4 Pages

    The web pages, the content and the web servers, this is the technology that helps the World Wide Web and helps store and manage the internet and the web content. D1: Role of TCP/IP protocol, linking with Application Layer protocol: TCP/IP stands for (Transmission Control Protocol/Internet Protocol); this is part of the Internet Protocol Suite. The role of TCP/IP is to make sure the data that it is receiving is been delivered to the right address, they are a combination of instructions that outline packages of information sent to the user. The TCP/IP contains different protocols HTTP , FTP , SMTP , DNS , RIP and SNMP .…

    • 867 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1380 Words
    • 6 Pages

    First to connect to the internet you need an internet service provider to have access to the internet which is a router to connect to your home network to the ISP. It can be wired or wireless connected to your home network. The web browser is a program which allows me to browse web pages such as my sync email account. You need a domain name to identify the IP address to have access; they are used in URLs to find particular web pages. URL first part is named a protocol finder and indicates what protocol should be used, the last part is a resource name and it identifies the IP address of where the resource is placed.…

    • 1380 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    The Internet was originally called the ARPANET, and in order to enhance the ARPANET to be enable may different types of computer networks to all communicate with each other, an open source protocol needed to be created, hence the development of TCP/IP. TCP/IP improved communications throughout the network and allowed all computers to easily communicate with one another. Another technology that helped expand the ARPANET to more users in a specific location was the development of the Ethernet. Ethernet is a coaxial cable that is still used today in many local area networks. Ethernet is highly effective in moving data from one computer to another at high speeds.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Most networks today use the TCP/IP protocol for how to communicate on the network and the most common is IP Version 4. Missing Elements In the diagram, it is showing that each department has three IP addresses assigned as well as three printers which are connected to the network via Ethernet. we can see that each department has three IP addresses assigned to it, and there are three printers, one for each department. These computers can communicate with one another as well as the printers, server, and Internet.…

    • 923 Words
    • 4 Pages
    Improved Essays

Related Topics