Before beginning work on this interactive assignment, review Chapter 10 in the t

Before beginning work on this interactive assignment, review Chapter 10 in the textbook, and review any relevant information in this week’s lecture. Access the MISM Credible Resource Guide for assistance with finding additional sources and information on this topic. For this interactive assignment access your virtual lab environment and follow the instructions provided within the lab.
As a network administrator of a company, you are faced with many networking problems that occur on a daily basis. Having an arsenal of tools and the knowledge to use them as part of your troubleshooting effort is critical. The following are common network troubleshooting commands. Be aware that many of these have useful switches that expand the command’s capabilities.
IPConfig
Tracert
Ping
Nslookup
GetMac
Netstat
Tasklist
Taskkill
Netsh
Netuse
Dnslookup
Arp
Route
Shutdown
Within your virtual lab environment you will follow the instructions provided. In the virtual lab, create a PDF with a screenshot of each complete step of the instructions. (Be sure to include two screenshots per page in your PDF.) Once you have completed the exercise within the virtual lab, download the PDF and attach it to your initial post.
In the body of your initial post, provide an explanation of each command. Using what you completed in the virtual lab, provide examples or use scenarios that demonstrate where or how each of the commands can be used when troubleshooting network problems.
the software. If the e-mail is heading out onto the Internet, the transport layeradds a TCP header to the front of the e-mail message. The information in thisheader is used by the TCP layer at the receiving workstation to perform one ormore of the six transport functions. The TCP header contains the fields shownin Figure 10-7. Let us examine only those fields that assist TCP in performingthe six functions listed earlier.Figure10-7The fields of theTCP headerSource PortDestination PortSequence Number16 bits16 bits32 bitsAcknowledgment NumberHlenFlagsWindow32 bits4 bits16 bitsChecksumUrgent PointerOptionalVariable LengthData . . . . . . . . . .Variable LengthReserved6 bits6 bitsOptionsPadding16 bits16 bitsThe first two TCP header fields, Source Port and Destination Port, containthe addresses of the application programs at the two ends of the transport connection. These port addresses are used in creating and terminating connections.The port number can also be used to multiplex multiple transport connection sover a single IP connection. It is important to note the difference between an IP address and a port number. The IP address identifies a device connected to the Internet, while the port number identifies an application on that device. Working together, the two create what is called a socket—a precise identification of a particular application on a particular device. What if your company has one server that handles both e-mail and FTP connections? The server would have one IP address but two different port numbers: one for the e-mail application and one for the FTP application. Now let us add the fact that this server is more than likely on a local area network, and thus has a network interface card (NIC) with a unique 48-bit NIC address. Now we have three addresses. The NIC address is used only on the local area network to find a particular device. The IP address is used to move the data packet through the Internet. The port number is used to identify the particular application on a device. The Sequence Number field contains a 32-bit value that counts bytes and indicates a packet’s data position within the connection. For example, if you are in the middle of a long connection in which thousands of bytes are being transferred, the Sequence Number tells you the exact position of this packet within that sequence. This field can be used to reassemble the pieces at the receiving workstation and determine if any packets of data are missing. The Window field contains a sliding window value that provides flow control between the two endpoints. If one end of the connection wants the other end of the connection to stop sending data, the Window field can be set to 0. The Checksum field is the next, and it provides an arithmetic check-sum of the header and the data field that follows the header. The Urgent Pointer is used to inform the receiving workstation that this packet of data contains urgent data. Like its counterpart IP, TCP is a fairly streamlined protocol. Its primary goal is to create an error-free, end-to-end connection across one or more networks. TCP and IP do have their shortcomings, however, and these have The Internet281Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Du
chapter10
the software. If the e-mail is heading out onto the Internet, the transport layeradds a TCP header to the front of the e-mail message. The information in thisheader is used by the TCP layer at the receiving workstation to perform one ormore of the six transport functions. The TCP header contains the fields shownin Figure 10-7. Let us examine only those fields that assist TCP in performingthe six functions listed earlier.Figure10-7The fields of theTCP headerSource PortDestination PortSequence Number16 bits16 bits32 bitsAcknowledgment NumberHlenFlagsWindow32 bits4 bits16 bitsChecksumUrgent PointerOptionalVariable LengthData . . . . . . . . . .Variable LengthReserved6 bits6 bitsOptionsPadding16 bits16 bitsThe first two TCP header fields, Source Port and Destination Port, containthe addresses of the application programs at the two ends of the transport con-nection. These port addresses are used in creating and terminating connections.The port number can also be used to multiplex multiple transport connectionsover a single IP connection.It is important to note the difference between an IP address and a port num-ber. The IP address identifies a device connected to the Internet, while the portnumber identifies an application on that device. Working together, the two cre-ate what is called asocket—a precise identification of a particular applicationon a particular device. What if your company has one server that handles bothe-mail and FTP connections? The server would have one IP address but two dif-ferent port numbers: one for the e-mail application and one for the FTP applica-tion. Now let us add the fact that this server is more than likely on a local areanetwork, and thus has a network interface card (NIC) with a unique 48-bit NICaddress. Now we have three addresses. The NIC address is used only on thelocal area network to find a particular device. The IP address is used to movethe data packet through the Internet. The port number is used to identify theparticular application on a device.The Sequence Number field contains a 32-bit value that counts bytes andindicates a packet’s data position within the connection. For example, if youare in the middle of a long connection in which thousands of bytes are beingtransferred, the Sequence Number tells you the exact position of this packetwithin that sequence. This field can be used to reassemble the pieces at thereceiving workstation and determine if any packets of data are missing.The Window field contains a sliding window value that provides flow con-trol between the two endpoints. If one end of the connection wants the otherend of the connection to stop sending data, the Window field can be set to 0.The Checksum field is the next field, and it provides for an arithmetic check-sum of the headerandthe data field that follows the header. The UrgentPointer is used to inform the receiving workstation that this packet of datacontains urgent data.Like its counterpart IP, TCP is a fairly streamlined protocol. Its primarygoal is to create an error-free, end-to-end connection across one or morenetworks. TCP and IP do have their shortcomings, however, and these haveThe Internet281Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Du