I. Ping Introduction Ping is a command in windows, which is also available in UNIX and Linux. Ping also belongs to a communication protocol and is part of the TCP/IP protocol. The ping command can be used to check whether the network is connected,
Ping through ICMP echo request and response
Some good examples of Ping: From http://www.thegeekstuff.com/2009/11/ping-tutorial-13-effective-ping-command-examples/ Ping Example 1. Increase or decrease the time interval between packets
By default
Some netizen message asks a question: Why installs the operating system to be unable to surf the net. My answer is: the normal Internet access depends on three: 1. There is no problem with the NIC and its driver; 2. There is no problem with the
1, the basic knowledge of ping
The ping command believes that we are all familiar with but it is not a lot of people who can play the role of Ping, of course, I am not saying that I can let ping play the most functions, I just often use ping this
The ping command in Linux is a commonly used network Command. it is usually used to test the connectivity with the target host. we often say, "ping a machine, check if it is on. "If you cannot open the webpage, you will say," You should ping the
1) how to view the port opened on the local machine:
Run the netstat-An command to view details! Next, stat has some English letters. Let me briefly explain what these English letters represent ~
Listen: listens for connection requests from remote
I. ping Command principle and working mechanism
• The ping command is generally used to detect network connectivity and network latency. The larger the value is, the slower the PING (PacketInternet Grope) and the Internet package Explorer are used
Document directory
1. Ping 127.0.0.1
2. Ping 192.168.1.10 [if this is the IP address of the Local Machine, use ipconfig to view the result]
3. Ping 192.168.1.38 [assume this is the IP address of a host in the same network segment in the LAN]
4.
As we all know, the ping command is a very useful network command, which is often used to test network connectivity. But at the same time, it is also a double-edged sword, especially in today's rapid development of the network, some "malicious"
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.