Effective Use of Ping Utility

Ping is a network utility to check the connectivity between two nodes in a computer network. Ping sends ICMP packets to destination device and if the packets reach the destination successfully, source device will receive ICMP replies. If the ICMP packets failed to reach the destination, we will get ping packet loss reply. ICMP is the short form of Internet Control Message Protocol. To check the connectivity of a destination host, say a website, follow the instructions.
  1. Open Command Prompt

  2. type ping [Destination Address] and press enter.

    Eg: ping www.corenetworkz.com
    Ping command to check connectivity

Practical Uses of Ping Command
  1. How to Change Default TTL Value Set On  Packets

  2.  Transmit failed. General Failure

  3. Automatically Set Continuous Echo Requests To a Destination Until We Manually Stop

  4. How to Change Default Size of ICMP Echo Request On Your Computer(ping -l)

  5. How to Check Optimium MTU Size Value Of Your Network

  6. Packet Needs To Be Fragmented But DF Set -Reason and Solution

  7. Tell Packets to Don't Fragment While in Test


How Ping Operates

It is important to learn the operation of ping utility. When we ping a destination host from our computer, ping sends ICMP echo request packets to the destination. Normally ping sends four packets and then wait for the ICMP reply from the destination host. If the packets reach the destination host successfully, our computer will receive ICMP reply from the destination. If there is no valid ICMP reply from the destination, ping displays packet loss message.

Possible Replies You Get When Ping a Destination Host

Based on the status of ICMP echo packets send, we may get different types of ICMP replies.
  1.  Reply: Destination Host Unreachable

  2.  Packets Error: Destination Net Unreachable

  3. ICMP Reply: Request Timed Out

  4. ICMP Echo Gives Hardware Error

  5. Request Could not Find Host. Please Check the Name and Try again

  6. Transmission Failed Error Code 31

  7. Error 628: The Connection was Terminated by the Remote computer before it could be Completed

  8. Error 797: A Connection to the Remote Access Server was not Made because the Modem was not Found

  9. Error 769: The Specified Destination is not Reachable

  10. The Requested Operation Requires Elevation

  11. Either you Specified a Destination Address that is not Valid or Remote Server is Down

Malicious uses of Ping Utility

Ping utility is used to find if a particular host is accessible or running. The same utility can be used to prevent a destination host from working smoothly. Here I give a list of tutorials tell the malicious use of ping utility to disturb the normal operations of devices connected to the Internet.
  1. Denial of Service (DOS) attacks

  2. How to Conduct Smurf Attack

  3. How to Perform TCP Split Handshake Attack

  4. Guide to DDOS Attack

Network Portal

No comments: