0% found this document useful (0 votes)
13 views4 pages

Written Assignment Unit 7

BEST NOTES

Uploaded by

Song Benard
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views4 pages

Written Assignment Unit 7

BEST NOTES

Uploaded by

Song Benard
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Mastering Unix Networking Functions: A Guide for New Network

Administrators
Introduction
As your company expands its IT administration services to Unix-based operating systems, it's essential
to equip new network administrators with the necessary skills to manipulate and control networking
functions in Unix. This technical document outlines the steps involved and explains key commands
essential for Unix networking.

Steps to Manipulate and Control Networking Functions

1. Configuring Network Interfaces


Network interfaces in Unix are configured using the ifconfig command or its more modern
counterpart, ip. These commands allow administrators to assign IP addresses, configure subnet masks,
and enable or disable interfaces.

Example:

sh Copy code

sudo ifconfig eth0 192.168.1.10 netmask 255.255.255.0 up

Explanation: This command configures the network interface eth0 with the IP address 192.168.1.10
and the subnet mask 255.255.255.0, then brings the interface up.

Output:

sh Copy code

eth0 Link encap:Ethernet HWaddr 00:1A:2B:3C:4D:5E inet addr:192.168.1.10


Bcast:192.168.1.255 Mask:255.255.255.0 UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0
overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B)

2. Managing Routing Tables


Routing tables determine how data packets travel through the network. The route command (or ip
route for modern systems) allows administrators to add, delete, and view routing information.

Example:

sh Copy code
sudo ip route add default via 192.168.1.1

Explanation: This command sets the default gateway to 192.168.1.1, directing all outbound traffic
through this gateway.

Output:

sh Copy code

default via 192.168.1.1 dev eth0 192.168.1.0/24 dev eth0 proto kernel scope link src
192.168.1.10

3. Configuring DNS Settings


DNS settings are critical for resolving domain names to IP addresses. These settings are typically
configured in the /etc/resolv.conf file. Administrators can add DNS servers and search domains here.

Example:

sh Copy code

echo "nameserver 8.8.8.8" | sudo tee -a /etc/resolv.conf

Explanation: This command adds Google's DNS server to the configuration file.

Output:

sh Copy code

nameserver 8.8.8.8

Key Commands for Unix Networking

1. ifconfig / ip
The ifconfig command is used to configure network interfaces. The ip command, part of the iproute2
suite, provides more functionality and is preferred in modern Unix systems.

Usage:

sh Copy code
sudo ifconfig eth0 down sudo ip addr add 192.168.1.10/24 dev eth0

Explanation:
sudo ifconfig eth0 down disables the eth0 interface.

sudo ip addr add 192.168.1.10/24 dev eth0 assigns an IP address to the eth0 interface using the
ip command.

Output:

sh Copy code

$ sudo ifconfig eth0 down $ sudo ip addr add 192.168.1.10/24 dev eth0

2. netstat
The netstat command displays network connections, routing tables, interface statistics, masquerade
connections, and multicast memberships.

Usage:

sh Copy code

netstat -r

Explanation:
netstat -r displays the routing table, showing how data packets are routed within the network.

Output:

sh Copy code

Kernel IP routing table Destination Gateway Genmask Flags MSS Window irtt Iface default
192.168.1.1 0.0.0.0 UG 0 0 0 eth0 192.168.1.0 * 255.255.255.0 U 0 0 0 eth0

3. ping
The ping command tests the reachability of a host on an IP network and measures the round-trip time
for messages sent from the originating host to a destination computer.

Usage:
sh Copy code

ping google.com

Explanation:
ping google.com sends ICMP ECHO_REQUEST packets to Google’s server to check connectivity
and measure response time.

Output:

sh Copy code

PING google.com (172.217.164.110): 56 data bytes 64 bytes from 172.217.164.110:


icmp_seq=0 ttl=115 time=25.7 ms 64 bytes from 172.217.164.110: icmp_seq=1 ttl=115
time=26.1 ms

Conclusion
Mastering Unix networking functions is crucial for effective IT administration. By following the steps
outlined and understanding the key commands discussed, new network administrators will be well-
equipped to manage and troubleshoot Unix-based networks efficiently.

References
Hiatt, J. M., & Creasey, T. J. (2012). Change Management: The People Side of Change. Prosci.
Lewin, K. (1947). Frontiers in Group Dynamics: Concept, Method, and Reality in Social Science;
Social Equilibria and Social Change. Human Relations.
Nemeth, E. (2017). Unix and Linux System Administration Handbook. Pearson Education.

You might also like