Network Monitoring  «Prev  Next»

Lesson 10

Network Monitoring Conclusion

Review what you have learned in this module.

In this module, you learned how to:
This module discussed how to use the ping command to test network connectivity
  1. Use the ping command to test network connectivity
  2. Use the netstat command to examine kernel tables pertaining to networking
  3. Use the traceroute command to discover network paths
  4. Use tcpdump to examine all network traffic

Key terms

In this module, we introduced the following terms:
  1. Ethernet: A LAN developed by Xerox in 1976. Ethernet became a widely implemented network from which the IEEE 802.3 standard for contention networks was developed. It uses a bus topology and the original Ethernet relies on CSMA/CD to regulate traffic on the main communication line.
  2. Internet control message protocol (ICMP): A protocol used to communicate errors or other conditions at the IP layer
  3. Raw socket: A raw socket allows privileged users direct access to a protocol other than those normally used for transport user data, for example, network level protocols.
  4. SUID permission: The SUID permission sets a process's user ID on execution.
  5. TCP/IP: TCP/IP is the network protocol suite used by the Internet and most local area networks.
  6. (UDP) User Datagram Protocol: A connectionless datagram service in the Transport layer used by applications that typically transmit small quantities of data.

Commands

In this module, we discussed the following commands:
CommandPurpose
ping Checks to see if a remote machine is alive
netstat Queries kernel tables for network status information of all kinds
traceroute Follows packets through the network—detects blockages
tcpdump Watches network traffic on a packet-by-packet level

Network Monitoring - Quiz

Click the Quiz link below to take a short multiple-choice quiz on the material covered in this module.
Network Monitoring - Quiz