More Subjects
352g bjbj 7 x xbFll80LZ0ppaaa@2aaaaauuuaXuauuu@NXu0ZurdruruPaauaaaaauaaaZaaaaraaaaaaaaal
IT
Students Name
Institutional Affiliation
Connectivity is always essential in any network as it helps the components of the network to share resources. Therefore, there is a need for diagnosing and testing connectivity to ensure continuous communication between the components of a network. During the process of diagnosing and testing, we use commands which are placed in the command prompt for the operating system of Microsoft or for the case of MAC we enter them in the terminal window. Some of the commands used include the ping which authenticates connectivity by transferring echo packets of Internet Control Message Protocol to the host. It then listens to the feedback of the echo. The traceroute command shows the path taken by the packets to arrive at its specified destination. The telnet command is used in testing various services for connectivity.
The difference between traceroute and ping is that traceroute shows the actual direction taken to arrive on the server as well as the time. On the other hand, ping shows if the server can be reached and the time taken to receive and send information to the server. The difference between tenet and ping is that telnet can be used to troubleshoot connectivity in web servers while ping can be used to fix communication so long as the computer runs on IP address. The similarity is that both are used as troubleshooting tools in communication (What are Traceroute, Ping, Telnet and Nslookup commands - Hosting, n.d.). The ACLS does not have any effect on the telnet because access is inbound, and as a result, there would be no match in the source and destination addresses.
Some of the ways to secure the entire network include putting in and monitoring the performance of firewall which can assist in blocking unauthorized access to the network or computer. The firewall provides rules to the outgoing and incoming traffic in the network and hence controls the access to a network or a computer. Another way is installing and maintaining anti-virus software which prevents hackers from cracking into the network. Updating networks password can as well help in providing security to the network because only authorized people will have access to the network. Other ways include the creation of a virtual private network.
Some of the types of ACLs include the standard access lists which only allows filtering of packet at the source IP address. They, therefore, have a less intensive processor for the router (Types of ACL - Standard and Extended ACLs ICND1 100-105, n.d.). Another type is the extended access lists, which is precise during filtration at the destination and source of the IP address. They use extra CPU time and also difficult to configure.
References
Types of ACL - Standard and Extended ACLs ICND1 100-105. (n.d.). Retrieved from https//www.learncisco.net/courses/icnd-1/acls-and-nat/type-of-acls.html
What are Traceroute, Ping, Telnet, and Nslookup commands - Hosting. (n.d.). Retrieved from https//www.namecheap.com/support/knowledgebase/article.aspx/9667/2194/what-are-traceroute-ping-telnet-and-nslookup-commands
IT PAGE MERGEFORMAT 4
Running head IT 1
/0B S wxl
n
_IU QcpaRhD(hCJOJQJaJhD(huCJOJQJaJhD(hsCJOJQJaJ-hD(hD(CJOJQJaJfHq hD(h73CJOJQJaJhD(hBCJOJQJaJhD(h6CJOJQJaJhD(h_tCJOJQJaJhk(CJOJQJaJhD(hD(CJOJQJaJhD(hm
CJOJQJaJhD( 0123456789@AB dagdD(Bx d-DM agdgd
dgdD(mabcefhiklnqstwwdJ3jhD(hm
CJOJQJUaJmHnHuhk(CJOJQJaJmHnHujhD(hm
CJOJQJUaJhm
CJOJQJaJhm
jhm
U)hhBCJOJPJQJaJph)hhm
BCJOJPJQJaJphhD(BCJOJPJQJaJphhhD(hCJOJQJaJhD(hm
CJOJQJaJabdeghjkmdK0d-DM K0gdd-DM agdmnahhm
CJOJQJaJhD(hm
CJOJQJaJhm
hD(hD(CJOJQJaJ5 01hpD(/ s666666666vvvvvvvvv6666666666666666666666666666666666666666666666666666666hH66666666666666666666666666666666666666666666666666666666666666666p626FVfv2(6FVfv6FVfv6FVfv6FVfv6FVfv6FVfv8XV 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ OJPJQJ_HmH nH sH tH JJNormaldCJ_HaJmH sH tH DA D
Default Paragraph FontRiR
0Table Normal4 l4a(k (
0No ListXXcpformatdddCJOJPJQJJaJ@D(0HeaderdH..D(0Header Char D(0FooterdH.1.D(0Footer CharPKContent_Types.xmlN0EH-J@ULTB l,3rJBG7OVa(7IRpgLr85vuQ8CX6NJCFB..YTe55 _g -Yl6NPK6_rels/.relsj0Qv/C/(hO Chvxp_P1H0ORBdJE4bq_6LR70O,En7Lib/SePKkytheme/theme/themeManager.xmlM @w7c(EbCA7K
Y,
e.,H,lxIsQ ,jGW)E 8PKRtheme/theme/theme1.xmlYF/lMBql4F3 iCCiH/6MwFcd
4IsNXp xpop,
we.pC0pm 8MQoDBF1vtp.4IPaQ4qm0qnAy0bfULlRJ3TlNS)a)Cv.xys@oE@)xRe_-4PHI.rm3g--PP
Yu),j-BXRH8@I7E10(2O4kLEzqO2POuz_gx7svnB2,E3p9GQd H
xuv 0F,FKsO3wvfSVbsyX p5veuw 1z@ l,ib
IjZ29LZ15xl.(zmd@23ln-@iDtd6lB63yy@tHjpUyeXry3sFXI
O5YYS.7bdn671.
tn/w/t6PssL.JiN AI)t2Lmx(-ixQCJuWlQyI@
m2DBAR4 wnaQ
W0xBdT/.3-FbYLKK6HhfPQh)GBms_CZys
v@c)h7JicFS.NP
eI Q@cpaAV.9HdHVXAYrApxSL93U5U
NC(pu@d4)t9M4WP5flk_X-CwTB Y,
AoYezxTVOlp
/gTpJ
EG,
AozAryerb/Ch,Eoo.
YgJW____RVW/79AkWjZuk y_Zklc,bUvPK
theme/theme/_rels/themeManager.xml.relsM 0woo5
6Q
,.aic21hqm@RNdo7gK(MR(.1rJT8VAHubP8g/QAs(LPK-Content_Types.xmlPK-60_rels/.relsPK-kytheme/theme/themeManager.xmlPK-Rtheme/theme/theme1.xmlPK-
theme/theme/_rels/themeManager.xml.relsPK xml version1.0 encodingUTF-8 standaloneyes
aclrMap xmlnsahttp//schemas.openxmlformats.org/drawingml/2006/main bg1lt1 tx1dk1 bg2lt2 tx2dk2 accent1accent1 accent2accent2 accent3accent3 accent4accent4 accent5accent5 accent6accent6 hlinkhlink folHlinkfolHlink/ ///EEHBm
)H8@0( B S bdeghjkmnnbdeghjkmnnlnIUa c abnnsGD(73_t6Buk(9s@m
bd@aaaa@UnknownGAx Times New Roman5Symbol3.Cx Arial7.@CalibriACambria Math1hiuGiuG 0JHP P92xxhphpOh0
px
hpNormalhp2Microsoft Office Word@@5@5 .,0hp
Title
(),-./014Root Entry FKO61TablerWordDocument7SummaryInformation(DocumentSummaryInformation8CompObjr F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q
More Subjects
Join our mailing list
@ All Rights Reserved 2023 info@freeessaywriter.net