NOTES ABOUT COMMANDS. ATTRIB.exe

Size: px
Start display at page:

Download "NOTES ABOUT COMMANDS. ATTRIB.exe"

Transcription

1 ATTRIB.exe Display or change file attributes. Find Filenames. Syntax ATTRIB [ + attribute - attribute ] [pathname] [/S [/D]] Key + : Turn an attribute ON - : Clear an attribute OFF pathname : Drive and/or filename e.g. C:\*.txt /S : Search the pathname including all subfolders. /D : Process folders as well attributes: R Read-only A Archive S System H Hidden The numeric values can be used when changing attributes with VBS/WSH. If no attribute is specified attrib will return the current attribute settings. Used with just the /S option ATTRIB will quickly search for a particular filename. Hidden and System attributes take priority. If a file has both the Hidden and System attributes set, you can clear both attributes only with a single ATTRIB command. For example, to clear the Hidden and System attributes for the RECORD.TXT file, you would type: ATTRIB -S -H RECORD.TXT

2 File Attributes You can use wildcards (? and *) with the filename parameter to display or change the attributes for a group of files. Remember that, if a file has the System or Hidden attribute set, you must clear that attribute before you can change any other attributes. Directory Attributes You can display or change the attributes for a directory/folder. To use ATTRIB with a directory, you must explicitly specify the directory name; you cannot use wildcards to work with directories. For example, to hide the directory C:\SECRET, you would type the following: ATTRIB +H C:\SECRET The following command would affect only files, not directories: ATTRIB +H C:*.* The Read-only attribute for a folder is generally ignored by applications, however the Read-only and System attributes are used by Windows Explorer to determine whether the folder is a special folder, such as My Documents, Favorites, Fonts, etc. Setting the Read-Only attribute on a folder can affect performance, particularly on shared drives because Windows Explorer will be forced to request the Desktop.ini of every sub-folder to see if any special folder settings need to be set.

3 chkdsk.exe Check Disk - check and repair disk problems Syntax CHKDSK [drive:][[path]filename] [/F] [/V] [/R] [/L[:size]] Key [drive:] The drive to check. filename File(s) to check for fragmentation (FAT only). /F Automatically Fix file system errors on the disk. /X Fix file system errors on the disk, (Win2003 and above) dismounts the volume first, closing all open file handles. /R Scan for and attempt Recovery of bad sectors. /V Display the full path and name of every file on the disk. /L:size NTFS only: change the log file size to the specified number of kilobytes. If size is not specified, displays the current log size and the drive type (FAT or NTFS). /C Skip directory corruption checks. /I Skip corruption checks that compare directory entries to the file record segment (FRS) in the volume's master file table (MFT)

4 Example: CHKDSK C: /F Fixing Errors /F If the drive is the boot partition, you will be prompted to run the check during the next boot. If you specify the /f switch, chkdsk will show an error if open files are found on the disk. Chkdsk /f will lock the volume, making data unavailable until chkdsk is finished. If you use chkdsk /f on a disk with a very large number of files (millions), chkdsk can take a long time to complete. When you delete a file or folder that has 'custom' permissions, the ACL is not deleted, it is cached. Chkdsk /f will remove ACLs that are no longer used. This is often the cause of the rather worrying message: "Windows found problems with the file system. Run chkdsk with the /F (fix) option to correct these." It is normal for chkdsk /F to remove unused index entries and unused security descriptors every time you run it, these do not indicate a problem with the file system. Scan only (without /f switch) If a file needs to be fixed chkdsk will alert you with a message but will not fix the error(s). chkdsk can report lost allocation units on the disk - it will produce this report even if the files are in-use (open). If corruption is found, consider closing all files and repairing the disk with /F. Running chkdsk on a data volume that is in use by another program or process can incorrectly report errors when none are present. To avoid this, close all programs or processes that have open handles to the volume. On computers running Windows 2003 SP1, chkdsk automatically creates a shadow copy, so you can check volumes that are 'in use' by another program or process. This enables an accurate report against a live file server. On earlier versions of Windows, chkdsk would always lock the volume, making data unavailable.

5 CIPHER.exe Encrypt or Decrypt files and folders. Without parameters cipher will display the encryption state of the current folder and files. NTFS volumes only. Syntax: Encrypt/Decrypt: CIPHER [{/e /d}] [/s:folder] [options] [/u[/n]] [{PathName [...]] New recovery agent certificate: CIPHER /r:pathnamewithoutextension Remove data: CIPHER /w:pathname Backup Keys: CIPHER /x[:pathname] options: /e Encrypt the folders. Folders are marked so that files that are added to the folder later are encrypted too. /d Decrypt the folders. Folders are marked so that files that are added to the folder later are encrypted too.

6 /s:folder Performs the operation in the folder and all subfolders. /a Perform the operation for files and directories. /i Continue even after errors occur. By default, cipher stops when it encounters an error. /f Force the encryption or decryption of all specified objects. By default, cipher skips files that have been encrypted or decrypted already. /q Quiet - Report only essential information. /h Display files with hidden or system attributes. By default, these files are not encrypted or decrypted. /k Create a new file encryption key for the user running cipher. /u Update the user's file encryption key or recovery agent's key to the current ones in all of the encrypted files on local drives (that is, if the keys have been changed). This option only works with /n. /n Prevent keys from being updated. Use this option to find all of the encrypted files on the local drives. This option only works with /u. PathName A pattern, file, or folder. /r:pathnamewithoutextension Generate a new recovery agent certificate and private key, and then write them to files with the filename PathNameWithoutExtension.

7 /w:pathname Remove data from unused portions of a volume. PathName can indicate any directory on the desired volume. Cipher does not obtain an exclusive lock on the drive. This option can take a long time to complete and should only be used when necessary. /x[:pathname] PathNameWithoutExtension Identifies the certificates and private keys used by EFS for the currently logged on user and backs them up to a file. If PathName is provided, the certificate used to encrypt the files is backed up. Otherwise, the user's current EFS certificate and keys will be backed up. The certificates and private keys are written to a file name PathNameWithoutExtension plus the file extension.pfx. It is recommended that you always encrypt both the file and the folder in which it resides, this prevents an encrypted file from becoming decrypted when it is modified. Cipher cannot encrypt files that are marked as read-only. Cipher will accept multiple folder names and wildcard characters. You must separate multiple parameters with at least one space. The /W option will remove data on unused portions of a volume, effectively erasing data that still resides on a hard drive after deletion. See Q for a description of this. Examples List encrypted files in the reports folder: CIPHER c:\reports\* Encrypt the Reports folder and all subfolders: CIPHER /e /s:c:\reports Back up the certificate and private key currently used to encrypt and decrypt EFS files to a file: CIPHER /x c:\myefsbackup

8 CONVERT.exe Convert a FAT16 or a FAT32 DISK volume to NTFS. Syntax convert [Volume] /fs:ntfs [/v] [/cvtarea:filename] [/nosecurity] [/x] Key Volume convert to NTFS. The drive letter (followed by a colon), mount point, or volume name to /fs:ntfs Convert the volume to NTFS. Required. /v Run convert in verbose mode, which displays all messages during the conversion process. /cvtarea:filename Specifies that the Master File Table (MFT) and other NTFS metadata files are written to an existing, contiguous placeholder file. This file must be in the root directory of the file system to be converted. Use of the /cvtarea parameter can result in a less fragmented file system after conversion. For best results, the size of this file should be 1 KB multiplied by the number of files and directories in the file system, although the convert utility accepts files of any size. Important You must create the placeholder file by using the fsutil file createnew command prior to running convert. Convert does not create this file for you. Convert overwrites this file with NTFS metadata. After conversion, any unused space in this file is freed. /nosecurity The security settings on the converted files and directories allow access by all users. /x Dismount the volume, if necessary, before it is converted. Any open handles to the volume will no longer be valid.

9 /? Displays help at the command prompt. If convert cannot lock the drive (for example, the drive is the system volume or the current drive), you are given the option to convert the drive the next time you restart the computer. If you cannot restart the computer immediately to complete the conversion, plan a time to restart the computer and allow extra time for the conversion process to complete. For volumes converted from FAT or FAT32 to NTFS: Due to existing disk usage, the MFT is created in a different location than on a volume originally formatted with NTFS, so volume performance might not be as good as on volumes originally formatted with NTFS. For optimal performance, consider recreating these volumes and formatting them with the NTFS file system. Volume conversion from FAT or FAT32 to NTFS leaves the files intact, but the volume might lack some performance benefits compared to volumes initially formatted with NTFS. For example, the MFT might become fragmented on converted volumes. In addition, on converted boot volumes, convert applies the same default security that is applied during Windows Setup. Example Convert the volume on drive E: to NTFS and display all messages during the conversion process: C:\> convert e: /fs:ntfs /v

10 Defragment hard drive. DEFRAG Syntax DEFRAG <volume> [-a] [-f] [-v] [-?] Options volume drive letter or mount point (d: or d:\vol\mountpoint) -a Analyze only -f Force defragmentation even if free space is low -v Verbose output Example: DEFRAG c:

11 Configure IP (Internet Protocol configuration) Syntax IPCONFIG IPCONFIG /all Display full configuration information. IPCONFIG /release [adapter] Release the IP address for the specified adapter. IPCONFIG /renew [adapter] Renew the IP address for the specified adapter. IPCONFIG /flushdns Purge the DNS Resolver cache. IPCONFIG /registerdns Refresh all DHCP leases and re-register DNS names. IPCONFIG /displaydns Display the contents of the DNS Resolver Cache. IPCONFIG /showclassid adapter Display all the DHCP class IDs allowed for adapter. IPCONFIG /setclassid adapter [classid] Modify the dhcp class id.

12 If the Adapter name contains spaces, use quotes: "Adapter Name" Wildcard characters * and? Are allowed, see the examples below. The default is to display only the IP address, subnet mask and default gateway for each adapter bound to TCP/IP. For Release and Renew, if no adapter name is specified, then the IP address leases for all adapters bound to TCP/IP will be released or renewed. For setclassid, if no CLASS ID is specified, then the CLASS ID is removed. DHCP User Classes allow additional or modified DHCP options to be applied to a subset of computers on the network, as identified by a CLASS ID. For example, a different gateway, DNS server, or lease time. This requires configuring the CLASS ID appropriately on the DHCP server. see RFC 3004 Examples: Show detailed information C:\> ipconfig /all Renew all adapters: C:\> ipconfig /renew Renew any connection that has a name starting with EL: C:\> ipconfig /renew EL* Release all connections matching *Con*, eg. "Local Area Connection 1" or "Local Area Connection 2": C:\> ipconfig /release *Con* Set the DHCP class ID for the named adapter to TEST: C:\> ipconfig /setclassid "Local Area Connection" TEST

13 MEM Display memory usage. Available only in 32 bit systems. Syntax MEM MEM /C MEM /D MEM /P Key /P List programs in memory with the memory address and size of each. /D List Programs(as /P) and also Devices /C List programs in conventional memory and list programs in upper memory MEM will only display details about the current CMD shell environment, programs running in a separate shell (or WIN32 programs) will not be listed - so it won't tell you anything about total memory usage.

14 PING Test a network connection - if successful, ping returns the ip address. Syntax PING [options] destination_host Options -w timeout Timeout in milliseconds to wait for each reply, default= i TTL Time To Live. -v TOS Type Of Service. -a Resolve addresses to hostnames. -n count Number of echo requests to send. -t Ping the destination host until interrupted. To see statistics and continue type Control-Break; To stop type Control-C. -l size Send buffer size (default=32). -f Set don t Fragment flag in packet (IPv4-only). -r count Record route for count hops (IPv4-only). -s count Timestamp for count hops (IPv4-only). -j host_list Loose source route along host_list (IPv4-only). -k host_list Strict source route along host_list (IPv4-only). destination_host The name of the remote host -R Use routing header to test reverse route also (IPv6-only). -S srcaddr Source address to use. -4 Force using IPv4. -6 Force using IPv6. A response of "Request timed out" means there was no response within the default time period of 4 seconds. If the latency of the response is more than 4 seconds. Use the -w option to increase the time-out. For example, to allow responses within 10 seconds, use ping -w 10000

15 The IPv6 options are only available on versions of Windows that support IPv6, e.g. Windows 7 / A successful PING does NOT always return an %errorlevel% of 0. Therefore to reliably detect a successful ping - pipe the output into FIND and look for the text "TTL" Note that "Reply" in the output of PING does not always indicate a positive response. Example message: Reply from : Destination Net Unreachable. Ping response times below 10 milliseconds often have low accuracy. A time of 10 milliseconds is roughly equal to a distance of 1860 Miles, travelling a straight line route at the speed of light, (or a round trip of miles). From this you can see that ping response times will give a very very rough estimate of the distance to a remote host. Network adminstrators do not appreciate frequent or continual pings to their servers, try not to overdo it! How to test connectivity with ping: 1) Ping the loopback address to verify that TCP/IP is installed and configured correctly on the local computer. PING ) Ping the IP address of the local computer to verify that it was added to the network correctly. PING IP_address_of_local_host 3) Ping the IP address of the default gateway to verify that the default gateway is functioning and that you can communicate with a local host on the local network. PING IP_address_of_default_gateway 4) Ping the IP address of a remote host to verify that you can communicate through a router. PING IP_address_of_remote_host How to create a timed delay with ping: Create a delay of 1 or more seconds by pinging the loopback address ( ) multiple times. The delay between each ping is 1 second, so for a delay of 5 seconds ping 6 times: PING -n >nul In tests this consumes less processor time than Sleep or Timeout - see Clay Calvert's original newsgroup posting.

16 Examples Ping a server just once: PING -n 1 Server64 Check if a host is reachable: PING Server64 find "TTL=" && ECHO MyHost found Check if a host is not reachable: PING Server64 find "TTL=" ECHO MyHost not found Test which iscsi IP on a specific NIC is functioning or if a specific teamed NIC is operating as it should: Ping -S (Source IP: XXX.XXX.XXX.XXX) (Destination IP:XXX.XXX.XXX.XXX) Ping -S Ping a website 5 times: PING -n 5 -w Monitor a website (example.com) every 15 off Echo Logging ping responses, press CTRL-C to stop :start Ping -n 1 example.com find "TTL=" >>c:\pingtest.txt Echo. Ping -n >nul goto start The script above can be used to test an Internet connection, just replace example.com with your ISP's Default Gateway IP address. This represents the first physical device on the ISP's side of your connection. You can find the Default Gateway on your router status screen. PING is named after the sound that a sonar makes.

17 ROBOCOPY.exe Robust File and Folder Copy. By default Robocopy will only copy a file if the source and destination have different time stamps or different file sizes. Syntax ROBOCOPY Source_folder Destination_folder [files_to_copy] [options] Key file(s)_to_copy : A list of files or a wildcard. (defaults to copying *.*) Source options /S : Copy Subfolders. /E : Copy Subfolders, including Empty Subfolders. Examples: Simple copy of all files from one folder to another: ROBOCOPY \\Server1\reports \\Server2\backup Copy files including subfolders (even empty ones /E). If this command is run repeatedly it will skip any files already in the destination, however it is not a true mirror as any files deleted from the source will remain in the destination. ROBOCOPY \\Server1\reports \\Server2\backup *.* /E

Chapter 5: Trouble shooting of a network

Chapter 5: Trouble shooting of a network 5 Troubleshooting TCP/IP Fig 5 show trouble shooting a TCP/IP Chapter 5: Trouble shooting of a network Steps 1 First, determines whether your local host is properly configured. Step 2 Next, uses the ping

More information

Procedure Note: The research steps for this lab are not included in this procedure.

Procedure Note: The research steps for this lab are not included in this procedure. Objective The objective of this lab assignment is to research and gain an understanding of the different tools and options available when needing to perform network analysis, and seek an understanding

More information

Homework #2. Objective: GRADE A. Equipment List: Procedure/Data: Activity 1A. Emmanuel A. Ellis Web Systems 9/7/2017

Homework #2. Objective: GRADE A. Equipment List: Procedure/Data: Activity 1A. Emmanuel A. Ellis Web Systems 9/7/2017 Objective: GRADE A Homework #2 Emmanuel A. Ellis Web Systems 9/7/2017 In this lab, we will be learning about some of the more basic first level troubleshooting tactics when a device seemseems to not be

More information

makes floppy bootable o next comes root directory file information ATTRIB command used to modify name

makes floppy bootable o next comes root directory file information ATTRIB command used to modify name File Systems File system o Designed for storing and managing files on disk media o Build logical system on top of physical disk organization Tasks o Partition and format disks to store and retrieve information

More information

Lab 6.7.1: Ping and Traceroute

Lab 6.7.1: Ping and Traceroute Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central Eagle Server S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0

More information

Homework 2: Lab Activity TCP/IP Network Monitoring and Management

Homework 2: Lab Activity TCP/IP Network Monitoring and Management Homework 2: Lab Activity TCP/IP Network Monitoring and Management Hw 2 Assigned on 2017/8/29, Due 2017/9/7 Hand-In Requirement Prepare a activity/laboratory report (name it Hw2-WebSys-YourName.docx) using

More information

Homework 2 TCP/IP Network Monitoring and Management

Homework 2 TCP/IP Network Monitoring and Management Homework 2 TCP/IP Network Monitoring and Management Hw 2 Assigned on 2015/9/1, Due 2015/9/15 Hand-In Requirement Prepare a activity/laboratory report (name it Hw4-WebSys-YourName.docx) using the ECET Lab

More information

70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced. Chapter 7: Advanced File System Management

70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced. Chapter 7: Advanced File System Management 70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management Objectives Understand and configure file and folder attributes Understand

More information

AT&T Digital Subscriber Line Service

AT&T Digital Subscriber Line Service AT&T Digital Subscriber Line Service Windows 2000 Professional PC Configuration Guide Overview Welcome to AT&T DSL Internet Service! This guide is designed to help you configure your PC to access the Internet

More information

NTFS Recoverability. CS 537 Lecture 17 NTFS internals. NTFS On-Disk Structure

NTFS Recoverability. CS 537 Lecture 17 NTFS internals. NTFS On-Disk Structure NTFS Recoverability CS 537 Lecture 17 NTFS internals Michael Swift PC disk I/O in the old days: Speed was most important NTFS changes this view Reliability counts most: I/O operations that alter NTFS structure

More information

THOMAS RUSSELL, Information Technology Teacher

THOMAS RUSSELL, Information Technology Teacher THOMAS RUSSELL, Information Technology Teacher Historical/Conceptual After installing the hard drive it needs to be partitioned. Partitioning is the process of electronically subdividing the physical hard

More information

Lesson 1: Preparing for Installation

Lesson 1: Preparing for Installation 2-2 Chapter 2 Installing Windows XP Professional Lesson 1: Preparing for Installation When you install Windows XP Professional, the Windows XP Professional Setup program allows you to specify how to install

More information

User Guide. Version 2.1

User Guide. Version 2.1 Kaseya Backup and Disaster Recovery User Guide Version 2.1 August 11, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT

More information

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network Chapter 17 Windows Resources on a Network Objectives Learn how to support some client/server applications Learn how to share and secure files and folders on the network Learn how to troubleshoot network

More information

15 CMD Commands Every Windows User Should Know

15 CMD Commands Every Windows User Should Know 15 CMD Commands Every Windows User Should Know https://www.makeuseof.com/tag/15-cmd-commands-every-windows-user-know/ Contents 1. Assoc... 1 2. Cipher... 2 3. Driverquery... 2 4. File Compare... 3 5. Ipconfig...

More information

8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista

8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista 8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista Introduction If Vista is not available in your classroom, you may complete this lab by viewing the figures in this document. Print and

More information

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Troubleshooting DHCP server configuration 28

Troubleshooting DHCP server configuration 28 Contents DHCP overview 1 Introduction to DHCP 1 DHCP address allocation 1 Allocation mechanisms 1 Dynamic IP address allocation process 2 IP address lease extension 2 DHCP message format 3 DHCP options

More information

Troubleshooting Tools

Troubleshooting Tools Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Copyright Notice

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Network layer: Overview. Network Layer Functions

Network layer: Overview. Network Layer Functions Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Dynamic Host Configuration

Dynamic Host Configuration Dynamic Host Configuration ITL RFC 2131 DHCP RFC 2132 DHCP Options RFC 951 - BOOTP 1/13/2004 (c) Hans Kruse & Shawn Ostermann, 2003 1 Overview How to Configure Hosts that Cannot store configuration info

More information

Advanced Operating Systems

Advanced Operating Systems Advanced Operating Systems File Systems: File Allocation Table, Linux File System, NTFS Lecture 10 Case Studies of File Systems File Allocation Table (FAT) Unix File System Berkeley Fast File System Linux

More information

Instructions For Formatting Hard Drive Windows 7 Command Prompt

Instructions For Formatting Hard Drive Windows 7 Command Prompt Instructions For Formatting Hard Drive Windows 7 Command Prompt How to format a hard drive in Windows Vista, 7 or 8: plus how to format hard drive drive, run the Universal USB Installer setup program,

More information

Table of Contents 1 System Maintaining and Debugging Commands 1-1

Table of Contents 1 System Maintaining and Debugging Commands 1-1 Table of Contents 1 System Maintaining and Debugging Commands 1-1 System Maintaining Commands 1-1 ping 1-1 tracert 1-4 System Debugging Commands 1-6 debugging 1-6 display debugging 1-7 i 1 System Maintaining

More information

Windows File System. File allocation table (FAT) NTFS - New Technology File System. used in Windows 95, and MS-DOS

Windows File System. File allocation table (FAT) NTFS - New Technology File System. used in Windows 95, and MS-DOS Windows File System Windows File System File allocation table (FAT) used in Windows 95, and MS-DOS NTFS - New Technology File System 2 Key features of NTFS NTFS uses clusters(rather than sectors) as units

More information

LAN Setup Reflection

LAN Setup Reflection LAN Setup Reflection After the LAN setup, ask yourself some questions: o Does your VM have the correct IP? o Are you able to ping some locations, internal and external? o Are you able to log into other

More information

3.1. Storage. Direct Attached Storage (DAS)

3.1. Storage. Direct Attached Storage (DAS) 3.1. Storage Data storage and access is a primary function of a network and selection of the right storage strategy is critical. The following table describes the options for server and network storage.

More information

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means

More information

TCP/IP Diagnostic Utilities on Windows 2008 Server

TCP/IP Diagnostic Utilities on Windows 2008 Server TCP/IP Diagnostic Utilities on Windows 2008 Server June 20, 2012 Copyright 2012 by World Class CAD, LLC. All Rights Reserved. TCP/IP Utilities In this lesson, we will learn about how to use the TCP/IP

More information

CS 457 Lecture 11 More IP Networking. Fall 2011

CS 457 Lecture 11 More IP Networking. Fall 2011 CS 457 Lecture 11 More IP Networking Fall 2011 IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented at each router) upper layer protocol

More information

COMP091 Operating Systems 1. File Systems

COMP091 Operating Systems 1. File Systems COMP091 Operating Systems 1 File Systems Media File systems organize the storage space on persistent media such as disk, tape, CD/DVD/BD, USB etc. Disk, USB drives, and virtual drives are referred to as

More information

Internet Control Message Protocol

Internet Control Message Protocol Internet Control Message Protocol The Internet Control Message Protocol is used by routers and hosts to exchange control information, and to inquire about the state and configuration of routers and hosts.

More information

File Services. Chapter 5. Topics in this Chapter: Understanding Windows File Systems. Understanding Linux File Systems

File Services. Chapter 5. Topics in this Chapter: Understanding Windows File Systems. Understanding Linux File Systems Chapter 5 File Services Topics in this Chapter: Understanding Windows File Systems Understanding Linux File Systems Understanding Permissions Management (Access Control) Understanding File Backup, Restore,

More information

Configure IP SLA Tracking for IPv4 Static Routes on an SG550XG Switch

Configure IP SLA Tracking for IPv4 Static Routes on an SG550XG Switch Configure IP SLA Tracking for IPv4 Static Routes on an SG550XG Switch Introduction When using static routing, you may experience a situation where a static route is active, but the destination network

More information

Networking Notes. Common Internet Speeds. Online Speed Test myspeed.visualware.com

Networking Notes. Common Internet Speeds. Online Speed Test myspeed.visualware.com Networking Notes Common Internet Speeds Dial Up 56 kbs 1000kbs = 1 mbs (1 user capacity) DSL 1.5 mbs (1 channel 10 user capacity) T1 1.5 mbs (24 channel 500 user capacity) Scalable Ethernet (Adjustable

More information

Description of the Windows XP Recovery Console for advanced users

Description of the Windows XP Recovery Console for advanced users Page 1 of 11 Article ID: 314058 - Last Review: September 22, 2008 - Revision: 5.4 Description of the Windows XP Recovery Console for advanced users System Tip This article applies to a different version

More information

Internet Protocols (chapter 18)

Internet Protocols (chapter 18) Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol

More information

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG Lecture 2: Internet Protocol (IP) Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 2-1 Network Layer Provides the upper layers with independence from the data

More information

Operation Manual IP Addressing and IP Performance H3C S5500-SI Series Ethernet Switches. Table of Contents

Operation Manual IP Addressing and IP Performance H3C S5500-SI Series Ethernet Switches. Table of Contents Table of Contents Table of Contents... 1-1 1.1 IP Addressing Overview... 1-1 1.1.1 IP Address Classes... 1-1 1.1.2 Special Case IP Addresses... 1-2 1.1.3 Subnetting and Masking... 1-2 1.2 Configuring IP

More information

Table of Contents 1 DHCP Overview DHCP Server Configuration 2-1

Table of Contents 1 DHCP Overview DHCP Server Configuration 2-1 Table of Contents 1 DHCP Overview 1-1 Introduction to DHCP 1-1 DHCP Address Allocation 1-2 Allocation Mechanisms 1-2 Dynamic IP Address Allocation Process 1-2 IP Address Lease Extension 1-3 DHCP Message

More information

Table of Contents 1 System Maintenance and Debugging Commands 1-1

Table of Contents 1 System Maintenance and Debugging Commands 1-1 Table of Contents 1 System Maintenance and Debugging Commands 1-1 System Maintenance Commands 1-1 ping 1-1 ping ipv6 1-5 tracert 1-6 tracert ipv6 1-7 System Debugging Commands 1-8 debugging 1-8 display

More information

LAN Setup Reflection. Ask yourself some questions: o Does your VM have the correct IP? o Are you able to ping some locations, internal and external?

LAN Setup Reflection. Ask yourself some questions: o Does your VM have the correct IP? o Are you able to ping some locations, internal and external? LAN Setup Reflection Ask yourself some questions: o Does your VM have the correct IP? o Are you able to ping some locations, internal and external? o Are you able to log into other VMs in the classroom?

More information

Veritas System Recovery Disk Help

Veritas System Recovery Disk Help Veritas System Recovery Disk Help About recovering a computer If Windows fails to start or does not run normally, you can still recover your computer. You can use the Veritas System Recovery Disk and an

More information

Command Manual Network Protocol. Table of Contents

Command Manual Network Protocol. Table of Contents Table of Contents Table of Contents Chapter 1 IP Address Configuration Commands... 1-1 1.1 IP Address Configuration Commands... 1-1 1.1.1 display ip host... 1-1 1.1.2 display ip interface... 1-1 1.1.3

More information

Vorlesung Kommunikationsnetze

Vorlesung Kommunikationsnetze Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

DHCP Overview. Introduction to DHCP

DHCP Overview. Introduction to DHCP Table of Contents DHCP Overview 1 Introduction to DHCP 1 DHCP Address Allocation 2 Allocation Mechanisms 2 Dynamic IP Address Allocation Process 2 IP Address Lease Extension 3 DHCP Message Format 3 DHCP

More information

Machine Language and System Programming

Machine Language and System Programming زبان ماشين وبرنامه نويسی سيستم Machine Language and System Programming جلسه دوازدھم دانشگاه صنعتی ھمدان پاييز 1389 Objectives Explain the purpose and structure of file systems Describe Microsoft file structures

More information

Contents. Ping, tracert, and system debugging commands 1. debugging 1 display debugging 1 ping 2 ping ipv6 5 tracert 7 tracert ipv6 10

Contents. Ping, tracert, and system debugging commands 1. debugging 1 display debugging 1 ping 2 ping ipv6 5 tracert 7 tracert ipv6 10 Contents Ping, tracert, and system debugging commands 1 debugging 1 display debugging 1 ping 2 ping ipv6 5 tracert 7 tracert ipv6 10 i Ping, tracert, and system debugging commands debugging Syntax Default

More information

HELP Use the help command to list all the following supported commands:

HELP Use the help command to list all the following supported commands: Available commands within Windows Recovery Console The following commands are available within the Windows Recovery Console. The commands are not case-sensitive. HELP Use the help command to list all the

More information

HP FlexFabric 5930 Switch Series

HP FlexFabric 5930 Switch Series HP FlexFabric 5930 Switch Series Layer 3 - IP Services Configuration Guide Part number: 5998-4571 Software version: Release 2406 & Release 2407P01 Document version: 6W101-20140404 Legal and notice information

More information

Network Layer. The Network Layer. Contents Connection-Oriented and Connectionless Service. Recall:

Network Layer. The Network Layer. Contents Connection-Oriented and Connectionless Service. Recall: Network Layer The Network Layer Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control 1 2 Contents 4.1.1 Connection-Oriented and Connectionless

More information

Network Layer. Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control

Network Layer. Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control The Network Layer 1 Network Layer Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control 2 Contents Connection-Oriented (virtual circuit)

More information

Create a Dual Stack Virtual Private Cloud (VPC) in AWS

Create a Dual Stack Virtual Private Cloud (VPC) in AWS Create a Dual Stack Virtual Private Cloud (VPC) in AWS Lawrence E. Hughes 5 November 2017 This recipe assumes you already have an AWS account. If you don t there is a lot of information online (including

More information

Glossary. The target of keyboard input in a

Glossary. The target of keyboard input in a Glossary absolute search A search that begins at the root directory of the file system hierarchy and always descends the hierarchy. See also relative search. access modes A set of file permissions that

More information

HP FlexFabric 5930 Switch Series

HP FlexFabric 5930 Switch Series HP FlexFabric 5930 Switch Series Layer 3 IP Services Command Reference Part number: 5998-4568 Software version: Release 2406 & Release 2407P01 Document version: 6W101-20140404 Legal and notice information

More information

Troubleshooting Your Network

Troubleshooting Your Network Troubleshooting Your Network Networking for Home and Small Businesses Chapter 9 Copyleft 2012 Vincenzo Bruno (www.vincenzobruno.it) Released under Crative Commons License 3.0 By-Sa Cisco name, logo and

More information

General Network Troubleshooting

General Network Troubleshooting Overview Contents This document outlines some basic network troubleshooting techniques that can be used to test network connectivity. They are useful when troubleshooting issues with Crystal Enterprise

More information

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols Network+ Guide to Networks 6 th Edition Chapter 4 Introduction to TCP/IP Protocols Objectives Identify and explain the functions of the core TCP/IP protocols Explain the TCP/IP model and how it corresponds

More information

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4 CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication

More information

COURSE OUTLINE. Division of Business and Technology NET 239. WAN Data Communications. Credits: 3 Class Hours: 2 Lab Hours: 2

COURSE OUTLINE. Division of Business and Technology NET 239. WAN Data Communications. Credits: 3 Class Hours: 2 Lab Hours: 2 COURSE OUTLINE Division of Business and Technology NET 239 WAN Data Communications Approved Catalog Description Covers the technology and terminology required to use routing and switching technologies

More information

File System NTFS. Section Seven. NTFS, EFS, Partitioning, and Navigating Folders

File System NTFS. Section Seven. NTFS, EFS, Partitioning, and Navigating Folders 13 August 2002 File System Section Seven NTFS, EFS, Partitioning, and Navigating Folders NTFS DEFINITION New Technologies File System or NTFS was first applied in Windows NT 3.0 back in 1992. This technology

More information

Operating Systems. Lecture File system implementation. Master of Computer Science PUF - Hồ Chí Minh 2016/2017

Operating Systems. Lecture File system implementation. Master of Computer Science PUF - Hồ Chí Minh 2016/2017 Operating Systems Lecture 7.2 - File system implementation Adrien Krähenbühl Master of Computer Science PUF - Hồ Chí Minh 2016/2017 Design FAT or indexed allocation? UFS, FFS & Ext2 Journaling with Ext3

More information

Example Implementations of File Systems

Example Implementations of File Systems Example Implementations of File Systems Last modified: 22.05.2017 1 Linux file systems ext2, ext3, ext4, proc, swap LVM Contents ZFS/OpenZFS NTFS - the main MS Windows file system 2 Linux File Systems

More information

Chapter 14: Advanced Troubleshooting

Chapter 14: Advanced Troubleshooting Chapter 14: Advanced Troubleshooting IT Essentials v6.0 ITE v6.0 1 Chapter 14 - Sections & Objectives 14.0 Introduction Review Troubleshooting Steps 14.1 Computer Components and Peripherals Troubleshoot

More information

File Shredders. and, just what is a file?

File Shredders. and, just what is a file? File Shredders. File shredders delete a file but they do that in a way that is different from how the Windows operating system (and all regular Windows applications) delete files. To understand the difference,

More information

Configuring IP Services

Configuring IP Services CHAPTER 8 Configuring IP Services This chapter describes how to configure optional IP services supported by the Cisco Optical Networking System (ONS) 15304. For a complete description of the commands in

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

Lab DHCP Client Setup

Lab DHCP Client Setup Lab 9.3.5 DHCP Client Setup Objective The purpose of this lab is to introduce Dynamic Host Configuration Protocol (DHCP) and the process for setting up a network computer as a DHCP client to use DHCP services.

More information

Table 12.2 Information Elements of a File Directory

Table 12.2 Information Elements of a File Directory Table 12.2 Information Elements of a File Directory Basic Information File Name File Type File Organization Name as chosen by creator (user or program). Must be unique within a specific directory. For

More information

IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems

IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems 5.0 Introduction 1. What controls almost all functions on a computer? The operating system 5.1 Explain the purpose of an operating system 2.

More information

LevelOne FNS bay/1usb Soho NAS. User s Manual

LevelOne FNS bay/1usb Soho NAS. User s Manual LevelOne FNS-1000 1- bay/1usb Soho NAS User s Manual Table of Contents Introduction... 2 The FNS-1000 NAS Server... 2 FNS-1000 Features... 2 Package Contents... 2 System Requirements... 2 Disclaimer...

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

Lab - Configure a NIC to Use DHCP in Windows

Lab - Configure a NIC to Use DHCP in Windows Introduction In this lab, you will configure an Ethernet NIC to use DHCP to obtain an IP address and test connectivity between two computers. Recommended Equipment Wireless router Two computers running

More information

CLARK COLLINS ITC 250 LABORATORY REPORT HW 2

CLARK COLLINS ITC 250 LABORATORY REPORT HW 2 CLARK COLLINS ITC 250 LABORATORY REPORT HW 2 INTRODUCTION: This lab report covers the steps necessary to perform network troubleshooting using open source and built in operating system tools. This report

More information

SEN366 (SEN374) (Introduction to) Computer Networks

SEN366 (SEN374) (Introduction to) Computer Networks SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (12 th Week) The Internet Protocol 12.Outline Principles of Internetworking Internet Protocol Operation Internet Protocol

More information

Ping, tracert and system debugging commands

Ping, tracert and system debugging commands Contents Ping, tracert and system debugging commands 1 Ping and tracert commands 1 ping 1 ping ipv6 5 tracert 7 tracert ipv6 9 System debugging commands 10 debugging 10 display debugging 11 i Ping, tracert

More information

Operating Systems. Operating Systems Professor Sina Meraji U of T

Operating Systems. Operating Systems Professor Sina Meraji U of T Operating Systems Operating Systems Professor Sina Meraji U of T How are file systems implemented? File system implementation Files and directories live on secondary storage Anything outside of primary

More information

Configuring the Cisco IOS DHCP Server

Configuring the Cisco IOS DHCP Server Cisco devices running Cisco software include Dynamic Host Configuration Protocol (DHCP) server and the relay agent software. The Cisco IOS DHCP server is a full DHCP server implementation that assigns

More information

3 Connection, Shell Serial Connection over Console Port SSH Connection Internet Connection... 5

3 Connection, Shell Serial Connection over Console Port SSH Connection Internet Connection... 5 Contents 1 Description 2 2 Supported Devices 3 3 Connection, Shell 4 3.1 Serial Connection over Console Port...................... 4 3.2 SSH Connection................................. 4 3.3 Internet Connection...............................

More information

Unit 5: Internet Protocols skong@itt-tech.edutech.edu Internet Protocols She occupied herself with studying a map on the opposite wall because she knew she would have to change trains at some point. Tottenham

More information

Computer Networking Introduction

Computer Networking Introduction Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.13 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram

More information

Assigning the Switch IP Address and Default Gateway

Assigning the Switch IP Address and Default Gateway CHAPTER 4 Assigning the Switch IP Address and Default Gateway This chapter describes how to create the initial switch configuration (for example, assigning the switch IP address and default gateway information)

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

Veritas System Recovery Disk Help

Veritas System Recovery Disk Help Veritas System Recovery Disk Help About recovering a computer If Windows fails to start or does not run normally, you can still recover your computer. You can use the Veritas System Recovery Disk and an

More information

Operation Manual DHCP. Table of Contents

Operation Manual DHCP. Table of Contents Table of Contents Table of Contents Chapter 1 DHCP Overview... 1-1 1.1 Introduction to DHCP... 1-1 1.2 DHCP IP Address Assignment... 1-2 1.2.1 IP Address Assignment Policy... 1-2 1.2.2 Obtaining IP Addresses

More information

Introduction to OS. File Management. MOS Ch. 4. Mahmoud El-Gayyar. Mahmoud El-Gayyar / Introduction to OS 1

Introduction to OS. File Management. MOS Ch. 4. Mahmoud El-Gayyar. Mahmoud El-Gayyar / Introduction to OS 1 Introduction to OS File Management MOS Ch. 4 Mahmoud El-Gayyar elgayyar@ci.suez.edu.eg Mahmoud El-Gayyar / Introduction to OS 1 File Management Objectives Provide I/O support for a variety of storage device

More information

Client Installation and User's Guide

Client Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Client Installation and User's Guide SC27-2809-04 IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Client Installation

More information

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi).

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi). Assignments Reading for Lecture 9: Section 3.3 3.2 Basic Internetworking (IP) Bridges and LAN switches from last section have limited ability CS475 Networks Lecture 8 Chapter 3 Internetworking is a logical

More information

A+ Certification Guide. Chapter 16 (Part B) Networking

A+ Certification Guide. Chapter 16 (Part B) Networking A+ Certification Guide Chapter 16 (Part B) Networking Chapter 16 (Part B) Objectives Installing and Configuring Network Interface Cards Networking Configuration for Small Network Switches and Routers Setting

More information

Router Architecture Overview

Router Architecture Overview Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized

More information

Broadband Router DC-202. User's Guide

Broadband Router DC-202. User's Guide Broadband Router DC-202 User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 Broadband Router Features... 1 Package Contents... 3 Physical Details...3 CHAPTER 2 INSTALLATION... 5 Requirements...

More information

Dynamic Host Configuration DHCP. DHCP Process Flow. Overview. DHCP Process Flow, cont. DHCP Process Flow, cont.

Dynamic Host Configuration DHCP. DHCP Process Flow. Overview. DHCP Process Flow, cont. DHCP Process Flow, cont. Dynamic Host Configuration RFC 2131 RFC 2132 Options RFC 951 - BOOTP ITL ITL: 2000-2005 Hans Kruse, Shawn Ostermann, Carl Bruggeman 2 Overview Process Flow How to Configure Hosts that Should not store

More information

Client Installation and User's Guide

Client Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Client Installation and User's Guide SC27-2809-03 IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Client Installation

More information

Chapter 4 Software-Based IP Access Control Lists (ACLs)

Chapter 4 Software-Based IP Access Control Lists (ACLs) Chapter 4 Software-Based IP Access Control Lists (ACLs) This chapter describes software-based ACLs, which are ACLs that processed traffic in software or CPU. (This type of ACL was also referred to as flow-based

More information

Networking Potpourri: Plug-n-Play, Next Gen

Networking Potpourri: Plug-n-Play, Next Gen Networking Potpourri: Plug-n-Play, Next Gen 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia

More information

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross

More information

ICMP (Internet Control Message Protocol)

ICMP (Internet Control Message Protocol) Today s Lecture ICMP (Internet Control Message Protocol) Internet Protocols CSC / C 573 I. ICMP Overview II. ICMP rror Reporting III. ICMP Query / Response Messages IV. ICMP Message Processing Fall, 2005

More information

CS435 Introduction to Big Data FALL 2018 Colorado State University. 11/7/2018 Week 12-B Sangmi Lee Pallickara. FAQs

CS435 Introduction to Big Data FALL 2018 Colorado State University. 11/7/2018 Week 12-B Sangmi Lee Pallickara. FAQs 11/7/2018 CS435 Introduction to Big Data - FALL 2018 W12.B.0.0 CS435 Introduction to Big Data 11/7/2018 CS435 Introduction to Big Data - FALL 2018 W12.B.1 FAQs Deadline of the Programming Assignment 3

More information

DCP585CW Windows Network Connection Repair Instructions

DCP585CW Windows Network Connection Repair Instructions Difficulty printing from your PC can occur for various reasons. The most common reason a networked Brother machine may stop printing, is because the connection between the computer and the Brother machine

More information