I. ping Command principle and working mechanism
• The ping command is generally used to detect network connectivity and network latency. The larger the value is, the slower the PING (PacketInternet Grope) and the Internet package Explorer are used
Windows ping command for most computer enthusiasts are not unfamiliar, through the ping IP can know whether the network is unblocked or network transmission quality, is the network technician commonly used detection network command, most friends to
The Ping command sends an Internet Control Message Protocol (ICMP) echo request message to verify the IP-level connection with another TCP/IP computer. it is an important command, today, I will explain how to use the ping command in linux.
• The
The principle and working mechanism of the ping command
ping commands are commonly used to detect network communication and impassability, also called time delay, the greater the value, the slower the ping (packetinternetgrope), the Internet Packet
ping commands are commonly used to detect network communication and impassability, also called time delay, the greater the value, the slower the ping (packetinternetgrope), the Internet Packet Explorer, used to test the amount of network
How the ICMP ping test works
Ping is a dedicated IP network tool that Ping sends an ICMP echo request message to the destination and reports whether it receives the expected ICMP echo response. Each operating system has the Ping tool installed, and
Ping command usage
Ping is a frequently used utility used to determine whether a local host can exchange (send and receive) data packets with another host. Based on the returned message, you can infer whether the TCP/IP parameter is set correctly
When a network problem occurs, the most common test tool is the Ping command. But sometimes we encounter Ping in one direction, for example, A and B computers connected to the same LAN through A HUB or A cross line, when checking the network
Source: ISA Chinese site
ISA Server does not provide MAC address control function, why? This is because the MAC address can only be used in the local network. When a packet crosses the router, the source MAC address of the host in the packet will
#!/bin/bash# executes # execution method: sh centospingbjbk.sh iplist1.txt# input: on the CentOS system Iplist.txt (IP list). Warning, can only be IP, cannot be host# output: faillist.txt (ping ip list), oklist.txt (ping ip list)
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.