Windows ping command for most computer enthusiasts are not unfamiliar, through the ping IP can know whether the network is unblocked or network transmission quality, is the network technician commonly used detection network command, most friends to
I. ping Command principle and working mechanism
• The ping command is generally used to detect network connectivity and network latency. The larger the value is, the slower the PING (PacketInternet Grope) and the Internet package Explorer are used
The Ping command sends an Internet Control Message Protocol (ICMP) echo request message to verify the IP-level connection with another TCP/IP computer. it is an important command, today, I will explain how to use the ping command in linux.
• The
Ping command usage
Ping is a frequently used utility used to determine whether a local host can exchange (send and receive) data packets with another host. Based on the returned message, you can infer whether the TCP/IP parameter is set correctly
The principle and working mechanism of the ping command
ping commands are commonly used to detect network communication and impassability, also called time delay, the greater the value, the slower the ping (packetinternetgrope), the Internet Packet
ping commands are commonly used to detect network communication and impassability, also called time delay, the greater the value, the slower the ping (packetinternetgrope), the Internet Packet Explorer, used to test the amount of network
When a network problem occurs, the most common test tool is the Ping command. But sometimes we encounter Ping in one direction, for example, A and B computers connected to the same LAN through A HUB or A cross line, when checking the network
If you access the Internet through campus network or residential area, you must have heard of the MAC address. What is a MAC address? What is the role of a MAC address in this LAN environment? Next we will introduce the knowledge of MAC addresses,
If you access the Internet through campus network or residential area, you must have heard of the MAC address. What is a MAC address? What is the role of a MAC address in this LAN environment? Next we will introduce the knowledge of MAC addresses,
(I) How ping works
The source host (the host that inputs the ping command) sends an ECHO packet in the ICMP protocol to the target host.
If the recipient is alive, an ICMP echo-reply packet is returned to the source host.
(Ii) TTL
What does the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.