• IP addressing
  • How Ping Works
  • Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




    Download 6,34 Mb.
    Pdf ko'rish
    bet89/203
    Sana10.01.2024
    Hajmi6,34 Mb.
    #134102
    1   ...   85   86   87   88   89   90   91   92   ...   203
    Bog'liq
    Linux This Book Includes 4 Manuscripts The Underground Bible

    The Linux network interface
    There are different versions of Linux, and they name their network
    differently. Generally, all Linux OS will have the following two


    interfaces.
    Loopback. The loopback (Lo) interface will always have an IP address of 127.0.0.0 that represents
    the host. For example, you want to access a web page running on the same server as that you are, and
    then you will need to type, HTTP:127.0.0.1 on your browser .
    Ethernet. The Ethernet 0 (eth0) interface is basically the local network connection. When running
    Linux on a virtual machine, you will still be required to connect to a physical network interface of the
    host. Commonly, you will be required to cross-check if the Ethernet has an IP address and the eth0 is
    in an UP-state.
    MAC address
    The media access control (MAC) is an identifier assigned to a network at
    layer 2 of the data link layer. A network interface must have a MAC address
    which is commonly called the hardware address.MAC addresses are always
    to any adopter when they are manufactured or if it’s a virtual adapter, the
    address is assigned to the adapter when it is created and always appears in
    six groups of two hexadecimal digits each.The Ethernet interface explained
    above the MAC address is known as ether address or the link.
    IP addressing
    The IP addresses of all devices are unique on a particular network; hence,
    every device has at least one address. IP addresses normally fall between
    1.1.1.1 and 255.255.255.
    Example 1
    To view the IP address used, you will type the IP address commands which
    will look like the one below
    6536 qdisc noqueue state UKNOWN
    group default
    Lin/loopback 00.00.00.00.00.00 brd 00.00.00.00.00.0 0
    inet 127.0.0.1/8 scope host Io
    valid_Ift forever preferred_If forever
    inte 6::1/128 scope host
    valid_Ift forever preffered_Ift forever
    There is one Linux networking tool that everyone conversant with Linux
    has heard of, i.e. ping. It began as an acronym and now has gotten to enjoy
    its status as a fully flagged word and now it’s the most commonly used tool
    in testing the reachability of a network
    How Ping Works


    Ping starts by sending an internet control message protocol (ICMP) across
    the network; then, it will notify when there is a response or not. If the host
    is able to connect to the network, it will send an ICMP success response.
    However, if the user is unable to connect to the network, it will send a ping
    test failed
    Another tool used by Linux in the troubleshooting process is the trace roo
    t. Traceroot usually Probes the network between the local system and the
    destination; hence, it will gather all information; hence, it will gather all
    information about the IP router in the path. Tracetoot is useful when there is
    an issue in the path, such as network issues intermediary nodes. showing
    slow response then you may want to know which node is showing the slow
    response .

    Download 6,34 Mb.
    1   ...   85   86   87   88   89   90   91   92   ...   203




    Download 6,34 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

    Download 6,34 Mb.
    Pdf ko'rish