Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Maryam Khalid

Bronze
Ask Maryam Khalid
60 Visits
0 Followers
0 Questions
Home/ Maryam Khalid/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: February 3, 2022In: Q & A

    Which Statement Describes A Syslog Server Characteristic?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on March 2, 2022 at 2:02 pm

    Which statement describes a Syslog server characteristic?​ To view Syslog messages The server must be installed on the network router. None of the freeware Syslog is present, just the enterprise version exists. Syslog has the disadvantage that is unable to store in the database. The Syslog server haRead more

    Which statement describes a Syslog server characteristic?​

    • To view Syslog messages The server must be installed on the network router.
    • None of the freeware Syslog is present, just the enterprise version exists.
    • Syslog has the disadvantage that is unable to store in the database.
    • The Syslog server has the advantage that it can do thorough searches on the data. 

    Answer: For the Syslog message to be seen the server has to be installed on the computer. Syslog has several free versions and Shareware, as well as one for purchases. With the large data which is assembled on the server, the network administrator can navigate it with little effort. one of the Syslog message advantages on the server is that it can do the data granular searches.it acts as the database for the information-related information which is received from a network device.

    Syslog is the protocol that is present for decades to transfer the message from the network devices to the log server, and it is called the Syslog server. to see the popularity it is used in the common operating system such as macOS, Linux, and Unix. Microsoft gains support with the help of third-party tools. Syslog is based on the three layers which are described in the following:

    • Syslog content: It is the data that exists in the event message.
    • Syslog application: It is the layer where the route is formed, interprets and the messages are also stored.
    • Syslog transport: It is the layer that is responsible to transfer the messages.

    It can give away for the network devices to transmit the messages and log events.to do this Syslog has a format that is easy for any application and device to use. The message has the following part:

    • Header.
    • Structured data.
    • Messages.

    Information about the versions, timestamp, hostname, message, and process ID, is present in the header. The data block in a standard form exists in structured data and the log message followed it.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: February 3, 2022In: Q & A

    Which Of The Following Statements Is True About Firmware?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on March 2, 2022 at 2:02 pm

    Which of the following statements is true of firmware? There is no need to load the firmware into the memory of the devices by the users. Real-time data. During the shutdown, the content is lost. The tracking software for the automobile. Answer: For the firmware, there is no need to load the firmwarRead more

    Which of the following statements is true of firmware?

    • There is no need to load the firmware into the memory of the devices by the users.
    • Real-time data.
    • During the shutdown, the content is lost.
    • The tracking software for the automobile.

    Answer: For the firmware, there is no need to load the firmware into the memory of the devices by the users.

    Firmware is the software that is imprinted into the hardware, and there is no need for API, an operating system, or the driver to do the functions just give the required instruction and the instructions for the communication with other devices or it can carry out a few of the basic operations as planned.

    If the firmware is not present then the device’s basic function would not work, and it is the reason it is stored in ROM chip, to make sure that it is not removed due to any reasons. firmware has also a complication such as a keyboard or hard drives or in the complicated structure as graphics card or a BIOS. While in android the firmware structure is different and it is an operating software device-specific.

    When you open the system, the first thing which executes is firmware which further sends the guidelines to the processor to work or operate. If the device is a keyboard, then without the software the firmware will continue working but it is a complicated device like PCs, tabs multiple firmware sets communicate to get the goal and load the OS.

    Despite the device structure, the firmware works with the normal and low-level language called the machine language, and the code of it can be written in a high-level language to reduce the complexity and also bring versatility but to be deployed in the device it has to be translated to a low-level language. For the different processors, the same firmware does not work because each processor determines certain instructions.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: February 3, 2022In: Q & A

    Which Of The Following Best Describes How To Turn On Public Folder Sharing?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on March 2, 2022 at 2:02 pm

    Which of the following best describes how to turn on public folder sharing? By permitting the feature to open the network and sharing center and allow the appropriate characteristics and the advanced option of sharing setting. Download the public sharing options. Shut down the public folder block inRead more

    Which of the following best describes how to turn on public folder sharing?

    • By permitting the feature to open the network and sharing center and allow the appropriate characteristics and the advanced option of sharing setting.
    • Download the public sharing options.
    • Shut down the public folder block in the windows firewalls.
    • First, click on computer management, then sharing tab access, and allow the public folders.

     

    Answer: By default, the public folder sharing is turned off, especially if the system is part of a homegroup. to permit or block the public folder sharing, first, open the network and sharing center and tap on the advance setting.

    Windows are connected with the folders and they are designed to share the documents with the end-user. The data in these folders are accessible by the other users of the PC and also on another system in a network. Public sharing is a very easy way for file sharing but by default, they are disabled. The steps to enable the public folders are listed in the following:

    • First, open the control panel.
    • Move to the control panel and internet and then to the sharing center option.
    • On the left side tap on the change advance sharing setting options.
    • The tap on the expands the all-network sections.
    • In the public folders sharing allow the turn on sharing.it will permit to read and write the files by the users.

    The files in the folder are public to the users who have access to it. the window gives the special feature of public folders which have subfolders which are to arrange the document’s images etc. The folders do not come with the files, but the users will enter the data into them. The list of the window 10 folders are:

    • C:\Users\Public\Public Documents
    • C:\Users\Public\Public Downloads
    • C:\Users\Public\Public Music
    • C:\Users\Public\Public Pictures
    • C:\Users\Public\Public Videos
    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: February 3, 2022In: Q & A

    A Physical Printer Containing Paper And Ink Or Toner To Which Print Jobs Are Sent Is Known As?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on March 2, 2022 at 2:02 pm

    A Physical Printer Containing Paper and Ink or Toner to Which Print Jobs Are Sent Is Known As? Print queue. Print server. Print devices. Protocol. Answer: The print device is a Physical Printer Containing Paper and Ink or Toner to Which Print Jobs Are Sent. Two types of print devices are present oneRead more

    A Physical Printer Containing Paper and Ink or Toner to Which Print Jobs Are Sent Is Known As?

    • Print queue.
    • Print server.
    • Print devices.
    • Protocol.

    Answer: The print device is a Physical Printer Containing Paper and Ink or Toner to Which Print Jobs Are Sent. Two types of print devices are present one is a: local print device and the other one is a network print device.

    The printer is the device that can accept the text and the graphics from the system and forward the information in paper, normally the size of the paper is 8.5” by 11” sheets. The size speed and expense of the system vary. For the quality print and high resolution, the expensive printer is enough. A window program prints to the printer which uses the driver for the printer to print and transfer toward the printer device.

    Printer types:

    Different printer manufacturer is present that’s why we have an option to select. some of them are listed in the following section:

    Inject printer:

    Inject print is known as the general type of personal printer and it creates the digital image by sprinkling ink on a paper.

    Laser printer:

    For high-quality prints, the laser printer is used, with the help of a laser beam which is passed with a high-speed n a negatively charged drum to describe the image. Nowadays color laser printers are present.

    3D printers:

    With the help of a digital file, a 3D image is formed.it operated by adding a layer on layer till the print is complete and a complete object is not formed.

    All-in-one printers:

    It is a device that performs multifunction by joining printing with copier, scanning, and the fax machine.

    LED printers:

    These are quite similar to laser printers but instead, the light-emitting diode is used to print rather than the laser beam.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: February 3, 2022In: Q & A

    Which Of The Following Terms Refers To A Network Resource?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on February 18, 2022 at 9:01 am

    Which of the following terms refers to a network resource sharing model that uses an access control list saved on each computer?  Peer-to-peer. Domain. OSI model. Client-server model. Workgroup Web directory. Answer: Peer-to-peer and the workgroup are the terms that refer to the network resource shaRead more

    Which of the following terms refers to a network resource sharing model that uses an access control list saved on each computer? 

    • Peer-to-peer.
    • Domain.
    • OSI model.
    • Client-server model.
    • Workgroup
    • Web directory.

    Answer: Peer-to-peer and the workgroup are the terms that refer to the network resource sharing model that uses the access control list which is saved on the computer.

    What do you know about the network resources?

    The network resources are also called the shared resources which are related to the computer data, its information, equipment’s which are accessible through the remote computer with the help of LAN (local area network) or organizations intranet. Shared resources are stored on the devices as the machines which are considered as a host for the clients to connect and access through the network.

    The network resources give the user access to work as the resources are present on their PCs. The resources which are often in use are files, data multimedia, and equipment of the computer as a printer, telefax machines. scanners etc. the LAN sharing is mostly used by the different systems such as hard drive, NIC, etc.

    An access to the printer and shared file needs the OS on the client-side which assists in access to the resources on the server-side. The server operating system supports access to the resources with the help of the client or from the client, the application layer protocols, protocols for file sharing, and the TCP/IP transport layers provide to gives the shared access.

    The operating system for the PCs have a distributed file system that assists file sharing. On the other hand, hand-held devices need extra installed software which assists file sharing.

    The network resource general example in the office is hardware’s. in the network each device is connected with each hardware through WIFI and makes the equipment use efficient. For those who have collaborated on projects, the data files are an important network resource. With the shared knowledge worker can change, update the manual documents, spreadsheet without the need to transfer the larger files with emails or copy the files on a portable flash drive. The worker can be able to use the file as they are using it on their computers.

    Moreover, file sharing and networks occur through the help of two communication which is: P2P (peer-to-peer) and other one is client/server models. Some of the controls must be followed by network resources which are:

    Security:

    It is the organization’s work to give the opportunities for unauthorized resources. The security control must be deployed to give an effective framework.

    Compatible:

    Many clients’ server-based operating systems are downloaded in the system but the client has its Operating system which is compatible to use the shared resources. If not, it will cause an issue with communication and need troubleshooting which is hectic for the client.

    Mapping:

    The shared equipment as files, hard drives might be accessible through mapping, which needs a destination address that is shared and also a naming agreement.

    FTP and file-sharing:

    File transfer protocol is immune to the effect of shared resources because it’s an important aspect of the internet. On the other hand, file sharing is the concept of LAN.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: February 3, 2022In: Q & A

    Which Statement Describes Ipv6 Ulas?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on February 18, 2022 at 9:00 am

    Which statement describes IPv6 ULAs? It is responsible to obtain the IPv6 address space. ISP is responsible to assign the IPv6 ULAs. It can start with fe80: :/ prefix. Over the internet, it is not routable. Answer: ULAs is the IPv6 unique local address that is alike the IPv4 private address and it iRead more

    Which statement describes IPv6 ULAs?

    • It is responsible to obtain the IPv6 address space.
    • ISP is responsible to assign the IPv6 ULAs.
    • It can start with fe80: :/ prefix.
    • Over the internet, it is not routable.

    Answer: ULAs is the IPv6 unique local address that is alike the IPv4 private address and it is not routable over the internet They do not hold IPv6 addresses. The network prefix for ULAs is the fc00:/7 range.

    What do you know about the ULAs?

    ULAs stands for the unique local address in an IPv6 with the address range fc00: :/7. The IPv4 private network is quite similar to the IPv6 ULAs. The ULAs might use freely without any centralized registration within the single site or in the company. ULAs are routable on the private network but not on the global IPv6 Internet.

    The prefix used by the unique local address is fc00: :/7 and it is extended with an L bit that indicates it is locally assigned. The address is divided into equal parts such as fc00: :/8 and fd00: :/8.

    Format of ULAs

    bits 7 1 40 16 64
    field prefix L random Subnet id Interface identifier

     

    Prefix contains the value in binary form 1111110. The L bit is held for locally assigned addresses and the range of L starts at 0, which is not set correctly. Only once the random field is selected only in the /48 prefix path.

    However, L bit 0, FC00: :/8 Is not defined and the proposal for an allocation authority for the management of it comes but is still not accepted by the IETF. The L bit 1 or the local address. fd00: :/8 is split to /48 prefixes which is created by adjusting the 40 bits which are following the fd8: :/ prefix to the randomly created bit string.

    The result for the prefix is in the form of fdXX: XXXX: XXXX: :/48 for all the prefixes in that range. If the user is not able to access the source for the random number then a proposal is suggested by RFC 4193 by forming the random identifier which can obtain a minimum-quality result for it.

    Characteristics of the ULAs:

    Some of the unique local address characteristics are defined in the following:

    • The range fd00: :/8 prefix is similar to the IPv4 private address range.
    • In the address registry, the ranges are not assigned and might be used without any involvement of an outsider.
    • There is no guarantee that they are completely globally unique.
    • The reverse DNA entries for the prefix fd00: :/8, ULAs are not implemented in the global DNS.
    • The prefix fd00: :/8 is not meant to be used by the outside of the administrative system, that is why there is no need to worry about the ULAs prefixes uniqueness
    • The fc00: :/7 subnet is responsible to assign the IPv6 ULAs, and technically from the bottom half of the fd00: :/8.
    • From this range, the ULAs generate the random 40 bits, though they are assigned manually for easy to remember.
    • They are expected to be global in scope.
    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: February 3, 2022In: Q & A

    What Benefit Does Nat64 Provide?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on February 18, 2022 at 9:00 am

    What benefit does NAT64 provide? The sites have a permit from NAT64 by using the IPv6 address and translating it to the global IPv6 address. The site can connect through multiple IPv4 hosts of the internet with the help of only one IPv4 address which is public. The site can connect the IPv6 host witRead more

    What benefit does NAT64 provide?

    • The sites have a permit from NAT64 by using the IPv6 address and translating it to the global IPv6 address.
    • The site can connect through multiple IPv4 hosts of the internet with the help of only one IPv4 address which is public.
    • The site can connect the IPv6 host with the IPv4 network by transforming the IPv6 addresses to IPv4 addresses with the help of NAT64.
    • The sites have the permission to use the private IPv4 addresses and also hide the architecture of addressing from a host on the public IPv4 network.

    Answer: NAT64 is the strategy for IPv6 which permits the site to connect the IPv6 host with the IPv4 network by transforming the IPv6 addresses to IPv4 addresses before the frames are sent on the IPv4 network.

    What is NAT64?

    NAT64 is the temporary strategic process that is defined to translate the IPv6 toIPv4 network address and make them ready for communication among them. This method also helps in the IPv6 migration and IPv4 exhaustion. However, NAT64 is the most common method because it helps in the translation of various use cases.

    The benefits of the NAT64 are defined below:

    • It is effective for smooth IPv6 migration and does not affect the quality of the internet for only IPv6 users.
    • The services are only given to the IPv6 and do not affect the network of IPv4.

    Types of the NAT64:

    NAT64 types are discussed in the following section:

    Stateless NAT64:

    Stateless NAT64 is responsible to map the translation between IPv6 to IPv4 address and vice versa. The communication can begin from either IPv6 or IPv4.the binding during the translation is not formed or modified in this technique.

    Stateful NAT64:

    The stateful NAT64 can translate the IPv6 to IPv4 address and vice versa. During performing the translation, the binding is modified by it. The communication begins from either IPv4 or IPv6 with the help of static mapping.

    Working of the NAT64:

    Let’s explain the working with the help of example take an IPv6-only network try to access the web services on the IPv4-only server. From the IPv6-only client to IPv4 servers the DNS64 gives the extension for NAT. both NAT64 and DNS64 work together to make communication possible between IPv6-only clients to IPv4-only servers.

    The NAT64 might have the gateway along with two interfaces one is connected with IPv6 and the other with IPv4 networks. The gateway work is to route the traffic of IPv6 which operates the translation and transfer the frames to the IPv4 network and vice versa. The translation is not smooth among them because the IPv6 address space is much greater than IPv4, and one-to-one mapping is not fit. That’s why the gateway has to manage the IPv6-to-IP4 mapping which forms through stateless NAT64 first frames through the gateway came at IPv4 network.

    Steps during the translation of IPv6 to IPv4 addresses are:

    1. The client of IPV6 searches the queries to the DNS64 server for AAAA record which is the IPv6 address based on some site URL.
    2. DNS64 servers make the IPv6 address based on the first 96-bits of the NAT65 device IPv6 address, and also on the 32 bits of the IPv4 address of the site server.
    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: February 3, 2022In: Q & A

    What Command Can Be Used On Most Linux Distributions To Find The Directories?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on February 18, 2022 at 9:00 am

    What command can be used on most Linux distributions to find the directories where the man pages are kept? Answer: echo $MANPATH is the command that can be used on most Linux distributions to find the directories where the man pages are kept. What is the interface for Linux commands? The commands arRead more

    What command can be used on most Linux distributions to find the directories where the man pages are kept?

    Answer: echo $MANPATH is the command that can be used on most Linux distributions to find the directories where the man pages are kept.

    What is the interface for Linux commands?

    The commands are considered as the OS utilities most of the advanced OS have command prompts on which the commands for a specific task are written and then the task is executed For Linux “Terminal Linux” is the platform on which the controls are made. The terminal is the CMD interface for the system interaction. the Linux commands are case-sensitive.

    The interface of Linux for command execution is far better as compared to Windows or macOS. From basic to advanced, all sorts of work is done with the Linux terminal. The category for basic work is file creation, delete, modify, or change the location of a file while the advanced work task is related to the administration as user management, networking task, and so on. The Linux terminal is open in the following step:

    • Enter CTRL+ALT+T together.
    • With the help of entering key execute the command.

    Linux commands

    Let’s see some of the basic and advanced Linux commands below:

    pwd:

    In the terminal first we reach the home directory. f you want to find the directory, the “pwd” command is used.it tells the absolute path which is the path from the root. The base of the Linux system is the root, and a forward slash (/) is used to denote it. The user directory is similar to “/home/username”.

    Is:

    The command is to determine the file name in the specified directory.to determine the hidden file in the directory type the “Is-a” command in the terminal.

    cd:

    To enter the directory the “cd” command of the terminal is used, for example, to switch from the home folder to download the type “Download CD”. The cd command is sensitive which means you have to type exactly the defined folder’s name. in some cases, the command may show an error then use the backward slash which will solve the error. For example instead of “cd Rasp pi” use “ cd Rasp\pi”.to move to the first folder then press “ cd..”.

    echo:

    the echo command is to move the data generally from text to file. If you want to create the new text file or append it to the existing file, type “echo hello this is xyzzy>>new. txt”. there is no need for the use of backward slash for space separation because >> is present when the text is complete.

    cat:

    To display the file content the cat command is helpful. Generally, it is used to view the program easily.

    nano, vi, jed:

    nano and vi are the installed editors in Linux terminal nano are the text editor that has colors keywords and identifies most of the languages. While vi is easier than nano a new file or the modification in the file can happen with the help of this editor, e.g. to create the file “check.txt” the nano editor is helpful in it with the command “nano check.txt”.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: February 3, 2022In: Q & A

    What Happens When A Router Receives A Packet With A Ttl Of 0?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on February 18, 2022 at 8:58 am

    What happens when a router receives a packet with a TTL of 0? Answer: When the router receives a packet with TTL 0f 0, generally it is dabbed by the router and the ICMP TTL is used by it, to send back the packet to its host IP. if the TTL is 0 then the particular packet gets dropped. However, the hoRead more

    What happens when a router receives a packet with a TTL of 0?

    Answer: When the router receives a packet with TTL 0f 0, generally it is dabbed by the router and the ICMP TTL is used by it, to send back the packet to its host IP. if the TTL is 0 then the particular packet gets dropped. However, the host sends the packets again and again even all of them not went or reach their destination.in simple words, the packet with TTL 0 sends the ICMP type 11 along with 0 code to the destined IP host.

    What do you know about TTL?

    Time-to-live TTL is the period of the packets of information that is present on the computer before its termination. TTL of the packets depends on the content such as TTL in internet protocol which gives the information to a network router for how long and when the frames exist in the network or computer.

    TTL in networking:

    In the packets, TTL is installed as the timestamp, and when the particular packet time ends, it can either be discarded or revalidated.TTL in networking is to keep the data frames moving indefinitely across the network’s works in an application is to maintain the data cache and the performance boosts. Other uses of TTL are content delivery network cache or DNS caching.

    Working of the TTL:

    The TTL value can be set between two values which are 1 and 255, while the different OS has varied in the default setting. The router will minus 1 from the TTL calculation when the frames are closer or by the router. After it, the frames move toward the next destinated host in a network. After the last subtraction, the TTL count becomes 0, and packets are removed by the router. Which initiates the ICMP (internet control message protocol) message which is moved back to the source host.

    TTL work is also known as a hop limit that keeps the undeliverable frames that are present in the routing loops, possibly due to the incorrect value of the routing tables, which are circulated in the network for a long time and make the network clogging.

    In MPLS (Multiprotocol label switching protocol) clouds, its TTL is a copy of IP TTL at the entering of the frames in the clouds. When the packets leave the MPLS TTL value is also copied to the IP TTL field in case the value is less than the value in the IP TTL field.

    If you want to increase the lifetime of the data frames, TTL comes in handy by determining the time of the packet’s circulation and its time for how long it can move in the network. This will give the sender details about the paths of the frames across the internet.

    Use of the TTL in different fields:

    Some of the TTL uses are mentioned below:

    • TTL is used for caching information for a fixed period.
    • CDNs use the TTL to find the period of the cached content to be served from the CDN server.
    • TTL is used by DNS to determine the time of DNS cache server might serve a DNS record.
    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: February 3, 2022In: Q & A

    Which Statement Is True About Cisco Ios Ping Indicators?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on February 18, 2022 at 8:58 am

    Which statement is true about Cisco IOS ping indicators?​ “!” is the definition of the ping which has no success and that the device could be in the problem of finding the DNS server. “U” defines that in the path the router has no route to the destination and ping is also unsuccessful. “- “explainsRead more

    Which statement is true about Cisco IOS ping indicators?​

    • “!” is the definition of the ping which has no success and that the device could be in the problem of finding the DNS server.
    • “U” defines that in the path the router has no route to the destination and ping is also unsuccessful.
    • “- “explains that ping is successful but the time of response is longer than usual time.
    • The combo of “- “and “!” defines that the router has now no longer traveled at the route of the vacation spot and responds with an ICMP message that can’t be reached.

    Answer: The pings of the Cisco IOS which are common are ‘!’, ‘.’ and ‘U’. The ping”!” “Indicate ping successfully check the link to Level 3. The “.” Ping shows that the issues as connectivity, routing, or the security are present at the path, and the ICMP unreachable message is not given. U ping determines that in the path, the router has not traveled to the destination and the answer provided by it is with an ICMP inattention/unreachable message.

    What do you know about the ping command?

    The ping command is a very effective method to test the connection. The test is also essential because it can also test the protocol stack, as the command move from layer 3 to the 2 layers and then to 1 layer of the OSI model. The protocol used by the ping for the test is ICMP.

    The command will not show the nature of the issue but it is useful to find the origin of the issue which is an essential step in network failure troubleshooting. Moreover, the command helps in the IPv4 configuration on the host and also gives the way to check the protocol stack.

    Cisco IOS ping indicator:

    The common IOS ping indicator is listed below:

    • ! – it shows the arrival of the ICMP echo reply message.
    • . – it shows the expiration time white it is waiting for ICMP echo reply message.
    • U – indicate the unreachable message of ICMP arrives.

    “!” shows the success of the ping command and verifies the connectivity of OSI model layer 3. the “.” Might show the communication issue.it shows the connectivity issue exists in the path.it also determines the router has no destination address route and the ICMP unreachable message is not sent. When the ping was blocked by the security the period can find it. The “U” determines that the request made by the ping command was blocked.

    The ping command can verify the localhost IP configuration. The loopback test happens with the ping command on the specific address which is reserved and known as loopback (127.0.0.1).it can also determine the correct working from the network to the physical layer of the protocol stack.

    The ping command is typed on the command-line interface.the ping loopback command syntax is:C:\> ping 127.0.0.1 and the result are shown as :

    Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

    Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

    Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

    Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

    Ping statistics for 127.0.0.1:

    Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),

    the approx round trip times in milli-seconds:

    Minimum = 0ms, Maximum = 0ms, Average = 0ms

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 11 12 13 14 15 … 29

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Shailendra Yadav

    Troubleshooting with TR-069 ACS for ISPs 

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}