Preview

Nt1310 Unit 5 Research Paper

Powerful Essays
Open Document
Open Document
670 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 5 Research Paper
The NETSTAT utility
The NETSTAT utility is a command available on most platforms that enables a user to list the sockets in use on a system. The information returned by the command is only for the local host, and there is no provision for monitoring remote hosts using this utility.
The most common uses for NETSTAT are:
_ Determining how many sockets are currently open on a system
_ Determining what application owns a particular socket
_ Diagnosing TCP/IP problems
_ Diagnosing routing problems
The NETSTAT command can be issued with or without parameters. Without parameters, the output generated by the command typically lists all of the active UDP and TCP connections in the system’s connection table. Options can be added to filter the output,
…show more content…
Conn The connection identification number.
650 TCP/IP Tutorial and Technical Overview
Local Socket The local IP address and port over which the connection is active.
Foreign Socket The remote IP address and port over which the connection is active.
State The state of the connection. Most implementations use some form of the following values for state:
• CloseWait
• Closed
• Established
• FinWait_1
• FinWait_2
• LastAck
• Listen
• SynReceived
• SynSent
• TimeWait
…show more content…
Example 2 Sample routing table
:\> NETSTAT -r
TCPIP Name: TCPIP 13:25:04
Destination Gateway Flags Refcnt Interface
----------- ------- ----- ------ ---------
Default 10.44.36.129 UGS 001504 INTRF1
Default 10.44.36.129 UGS 000006 INTRF2
10.44.36.128 0.0.0.0 US 000003 INTRF1
10.44.36.128 0.0.0.0 US 000000 INTRF2
10.44.36.129 0.0.0.0 UHS 000000 INTRF1
10.44.36.129 0.0.0.0 UHS 000000 INTRF2
10.44.36.163 0.0.0.0 UH 000000 VIPAL1
10.44.36.164 0.0.0.0 UH 000000 INTRF1
10.44.36.165 0.0.0.0 UH 000000 INTRF2
127.0.0.1 0.0.0.0 UH 000002 LOOPBACK
Again, the columns above are defined as follows:
Destination The route described by the report.
Gateway The gateway (if any) used to reach this route.
Flags Attributes of the route. Possible values include:
• G: The route uses a gateway.
• U: The interface over which the route travels is up.
• H: Only a single host can be reached through this route.
• D: The route was dynamically created.
• M: The route’s table entry was modified by an ICMP redirect message.
• !: The route is a reject route; datagrams will be dropped.
Refcnt The number of connections using this route.
Interface The interface used by the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    1. Port Scanning is the usage of software to find what ports are open on a network or on an individual computer, and which services are using those ports.…

    • 216 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nmap "Network Mapper" is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.…

    • 281 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, and also works against single hosts. Nmap runs on all major computer operating systems, Linux, Windows, and Mac OS…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The qtm.dll is one of the most important modules in the Windows operating systems. The Windows registry is the location of the file. You might see that you start getting qtm14.dll errors if the file is missing or damaged. You will need to find a qtm14.dll fix to resolve the issues.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Securing Windows Media

    • 481 Words
    • 2 Pages

    | Used for accepting incoming HTTP client connections and for delivering data packets to clients that are streaming by using HTTP.…

    • 481 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Week 5 iLab

    • 321 Words
    • 2 Pages

    For Socket information, the protocol will be TCP and the Source port will be set to sqlnet – Oracle. When you have completed the traffic configuration, capture the Traffic Generator window () as shown below and paste (V) it into the table cell provided below.…

    • 321 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ethical Hacking Lab

    • 445 Words
    • 2 Pages

    4. Enter the following command to view the pcap file in hexadecimal format (-x) using absolute, instead of relative, TCP sequence numbers (-S).…

    • 445 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    the actual IP address. The below table is an example of the IP 255.255.255.255. If you are new to…

    • 2629 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    UDP has a protocol ID of 17; ICMP has 1; ESP is 50. AH has a value of 51 in the IP hdr protocol field. TCP has a value of 6 for the protocol field in an IP hdr. Port # for HTTP over SSL = 443;…

    • 376 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Introduction to Port Scanning. (n.d.). About.com Internet / Network Security. Retrieved November 16, 2013, from http://netsecurity.about.com/cs/hackertools/a/aa121303.htm…

    • 3777 Words
    • 16 Pages
    Better Essays
  • Good Essays

    instractor

    • 757 Words
    • 5 Pages

    In this lab activity, you will create a network that is similar to the one shown in the Topology Diagram. Begin by cabling the network as shown in the Topology Diagram. You will then perform the initial router configurations required for connectivity. Use the IP addresses that are provided in the Addressing Table to apply an addressing scheme to the network devices. After completing the basic configuration, test connectivity between the devices on the network. First test the connections between directly connected devices, and then test connectivity between devices that are not directly connected. Static routes…

    • 757 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Solaris 10 Chit Sheet

    • 496 Words
    • 2 Pages

    Sun Ultra 5/10 UPA/PCI (UltraSPARC-IIi 300MHz), Keyboard Present OpenBoot 3.31 256 MB (60ns) memory installed, Serial #9685423. Ethernet address 8:0:20:93:c9:af, Host ID: 8093c9af.…

    • 496 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    programming

    • 21645 Words
    • 157 Pages

    Subnets Port numbers Socket functions: Socket, Bind, Connect, listen, Accept, Send, Recv, Sendto, Recvfrom, Close, Shutdown Byte order Structs Blocking Non-blocking Socket Programming Client-server programming model Example client Example server Programming project Required text Books Stephen R., Fenner B, Rudoff A, (2003) Unix Network Programming volume 1: The Sockets Networking API (3rd Edition) Stephens R., (2005)…

    • 21645 Words
    • 157 Pages
    Powerful Essays
  • Satisfactory Essays

    The above command lists out all "listening" "tcp" connections. The n option disables hostname resolution of the ip addresses giving the output faster.…

    • 732 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    feasibility analysis

    • 663 Words
    • 3 Pages

    A network connection is initiated by a client program when it creates a socket for the communication with the server. To create the socket in Java, the client calls the Socket constructor and passes the server address and the the specific server port number to it. At this stage the server must be started on the machine having the specified address and listening for connections on its specific port number. The server side socket associated with specific port is called server socket. When a connection request arrives on this socket from the client side, the client and the server establish a connection.…

    • 663 Words
    • 3 Pages
    Good Essays