what is the use of PING command?
Answers were Sorted based on User's Feedback
Answer / vandana
PING-packet internet groper.
this command is used to check the connectivity of a single
system with other systems(i.e. working properly).
PING is the ip address of the DNS server or remote host.
Is This Answer Correct ? | 102 Yes | 14 No |
Answer / safiullakhan80
ping command is used to check the connectivity between
computers in a network, it works with the help of ICMP-
(inernet control messaging protocol) and it is echo
oriented protocol. if we want to block the systems not to
ping then block the ICMP in firewall.
Is This Answer Correct ? | 57 Yes | 14 No |
Answer / shaiju
Ping [packet internet groper]is a computer network tool used to test whether a particular host is reachable across an IP network; it is also used to self test the network interface card of the computer, or as a speed test. It works by sending ICMP “echo request” packets to the target host and listening for ICMP “echo response” replies. Ping estimates the round-trip time, generally in milliseconds, records any packet loss, and prints a statistical summary when finished.
Is This Answer Correct ? | 33 Yes | 8 No |
Answer / kapilasdhir
Ping provides to check the Physical/IP Connectivity between
two or more devices in the network. Ping sends an ICMP
request from source computer to destination computer and
destination computer sends an ICMP reply
Is This Answer Correct ? | 35 Yes | 11 No |
Answer / venki
PING : It troubleshoots connection between ur computer and
any other computer on the internet or network
Is This Answer Correct ? | 14 Yes | 22 No |
What are the two types of transmission technology available
What is Proxy ARP
Give two reasons why PGP compresses messages.
What is an Operating System?
Why is IP called ‘best-effort delivery’ protocol?
How many layers are there in OSI ? Why is it called OSI model ?
Hi i need one website name.Which is used to identify or find the system or person who or which are logged in to the Internet or working with Internet.We can watch and access their drives(memory) also through that website.Could you please tell me which is that website.Please answer me.Advance thanks
1. What ports does FTP traffic travel over? 2. What ports does mail traffic utilize? 3. What ports do HTTP and HTTPS use? 4. Why is NTP required in an NFS network? 5. Name some common mal software on the server side 6. What is CPAN? How do you access it? 7. What is PEAR? 8. What advantages does mod_perl have over a perl CGI? 9. What is required to do SSL in Apache 1.x? 10. What is Tcl? 11. What is a servlet engine/container? 12. What is BIND? 13. Name the steps to setup a slave zone in BIND 14. Name the steps to setup a primary zone in BIND 15. What commands would you use under Solaris or Linux to modify/view an LDAP tree?
TCP/IP MODEL AND ITS RELATIVE DIFF WT OSI MODEL??????????
Compare satellite with fiber as a communication medium and enumerate the application areas where satellite still holds a niche(or special)marker.
Explain CSMA/CD
packet switching methods ?