1, Ping 127.0.0.1:
127.0.0.1 is a local circular address and if this address is not ping, the local machine TCP/IP protocol does not function.
2, ping This computer IP address:
Use Ipconfig to view the native IP, and then ping the IP, the general
Copy Code code as follows:
IP = "Jb51.net"
WQL = "SELECT * from win32_pingstatus Where address = ' $IP '"
WQL = Replace (WQL, "$IP", IP)
n = 0:s = 0
Do Until n = 100
Set objWMIService = GetObject ("winmgmts:\\.\root\cimv2")
Set colitems =
Linux:
While:;d o ping-c 1 172.16.128.36|awk '/ttl=/' |sed ' s/^/' date +%y-%m-%d\|%t '/'; sleep 1;done
See more highlights of this column: http://www.bianceng.cnhttp://www.bianceng.cn/Network/wgzs/
Execution results
2011-03-08|15:55:49 bytes
Ping belongs to a communication protocol, the use of ping to check whether the network connectivity, can help us to analyze and determine network failures, however, in the WinXP system of local area network if we want to check the IP address ping
Device failure, here to take out and share with you, I hope to be useful. Packet Internet groper (ping) This command is used primarily to check that the route is reachable because the Baochang of the command is very small. So the speed of the
When using wireless routers for wireless surfing, our neighbors may accidentally break into the local wireless network. These neighbors enjoy the bandwidth we provide for free, you may try to log on to the background management interface of the
Currently, wireless routing is widely used and has a large number of users. Many of them are not familiar with wireless router settings to improve our network security, so today I will explain some methods for setting wireless routers. When using a
In the wireless network world, we are not very clear about the wireless network settings. In this article, we will explain how to prevent neighbor intrusion from prohibiting PING, illegal settings, and nic binding?
When we use wireless router
Editor's note:You may think that the content introduced in this article is a bit old, and we agree that this is an earlier article. However, this article details how to set up an Internet cafe network, which is of great value to some network
As we all know, the ping command is a very useful network command, which is often used to test network connectivity. But at the same time, it is also a double-edged sword, especially in today's rapid development of the network, some "malicious"
First, view and test the networkViewing and testing your network configuration is the first step in managing Linux network services, and this section will learn about network viewing and test commands in Linux systems. Most of the commands described
1,ifconfigThe user can execute the ifconfig command to detect and set the local network interface. By default, this command displays the first NIC, the configuration information for eth0 and the native loop (lo,local loopback). If the user needs to
As we all know, the ping command is a very useful network command, which is commonly used to test network connectivity. But at the same time it is also the "double-edged sword", especially in the rapid development of the network today, some
I don't think you'll forget that Windows developed from a simple DOS character interface. Although we usually use the Windows operating system, mainly to the graphical interface to operate, but the DOS command we are still very useful, let me look
As we all know, the Ping command is a very useful network command, which is often used to test network connectivity. But at the same time, it is also a double-edged sword, especially in today's rapid development of the network, some "malicious"
When using wireless routers for wireless surfing, our neighbors may accidentally break into the local wireless network. These neighbors enjoy the bandwidth we provide for free, you may try to log on to the background management interface of the
Many of us are familiar with the use of wireless routers, but how can we defend against the endless intrusion of users? The following measures are helpful to you.
When using wireless routers for wireless surfing, our neighbors may accidentally break
We are all concerned about the prevention of network theft by others. So what aspects should we start with to prevent illegal network user intrusion?
When using wireless routers for wireless surfing, our neighbors may accidentally break into the
Ping's role ping is a special term for submarines, a sonar pulse that responds, and Ping is a very useful TCP/IP tool in the network. Its main function is to detect network connectivity and analyze network speed.
Ping has a good side and a bad side.
In simple terms, the TTL is full time to live, meaning the life cycle.
The following are references.
Ping is a very common gadget that is used primarily to determine network connectivity issues. After you use the ping command, common error
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.