Skip to main content

Effective Use of Ping Utility

Ping is a network utility to check the connectivity between two nodes in a computer network. Ping sends ICMP packets to the destination device and if the packets reach the destination successfully, the source device will receive ICMP replies. If the ICMP packets failed to reach the destination, we will get ping packet loss reply. ICMP is the short form of Internet Control Message Protocol. To check the connectivity of a destination host, say a website, follow the instructions.
  1. Open Command Prompt

  2. type ping [Destination Address] and press enter.

    Eg: ping
    Ping command to check connectivity

Practical Uses of Ping Command
  1. How to Change Default TTL Value Set On  Packets

  2.  Transmit failed. General Failure

  3. Automatically Set Continuous Echo Requests To a Destination Until We Manually Stop

  4. How to Change Default Size of ICMP Echo Request On Your Computer(ping -l)

  5. How to Check Optimum MTU Size Value Of Your Network

  6. Packet Needs To Be Fragmented But DF Set -Reason and Solution

  7. Tell Packets to Don't Fragment While in Test

How Ping Operates

It is important to learn the operation of ping utility. When we ping a destination host from our computer, ping sends ICMP echo request packets to the destination. Normally ping sends four packets and then wait for the ICMP reply from the destination host. If the packets reach the destination host successfully, our computer will receive ICMP reply from the destination. If there is no valid ICMP reply from the destination, ping displays packet loss message.

Possible Replies You Get When Ping a Destination Host

Based on the status of ICMP echo packets send, we may get different types of ICMP replies.
  1.  Reply: Destination Host Unreachable

  2.  Packets Error: Destination Net Unreachable

  3. ICMP Reply: Request Timed Out

  4. ICMP Echo Gives Hardware Error

  5. Request Could not Find Host. Please Check the Name and Try again

  6. Transmission Failed Error Code 31

  7. Error 628: The Connection was Terminated by the Remote computer before it could be Completed

  8. Error 797: A Connection to the Remote Access Server was not Made because the Modem was not Found

  9. Error 769: The Specified Destination is not Reachable

  10. The Requested Operation Requires Elevation

  11. Either you Specified a Destination Address that is not Valid or Remote Server is Down

Malicious uses of Ping Utility

Ping utility is used to find if a particular host is accessible or running. The same utility can be used to prevent a destination host from working smoothly. Here I give a list of tutorials tell the malicious use of ping utility to disturb the normal operations of devices connected to the Internet.
  1. Denial of Service (DOS) attacks

  2. How to Conduct Smurf Attack

  3. How to Perform TCP Split Handshake Attack

  4. Guide to DDOS Attack

No:Recent Tutorials
1 Functions of Transport Layer in a Network
PING: Transmit failed. General Failure
A solution for Destination Net Unreachable - Error
Destination host unreachable
How to Enable Disabled Adapter
Resolve Windows Automatic IP Address
Solutions for Hard Disk SMART Command Failed Error Message
How to Solve TTL Expired in Transit
Ping Request Could not Find Host
Error 769: The Specified Destination is not Reachable
Uses of Netstat Command


About Author

My photo
Alex George
Alex George has Engineering graduation in Computer Science and an MBA in Finance. He had been working as a senior Network Engineer for ten years. His specialization is in Cisco products. Traveling is one of his hobbies and visited various places as part of his onsite work. He visited different places as part of his onsite work like New York, Dubai, London, etc. Right now Alex is a director of one of the leading career development firms in India, which trains students for UPSC, SSC, and PSC examinations. He guides a lot of students to get selection for various prestigious institutions like CBI, Income Tax Department, etc. Alex George is a stock market investor and a very active intraday trader. Engineering Background: He has a B.Tech in Computer Science and Engineering and passed different network and security courses like CCNA, CCNP (Security), CEH, and various Microsoft certifications. Finance Background: Alex has an MBA in Finance. He is an active intraday trader and a Share Market Investor. Webmaster Skills: Alex is a blogger since 2004. He has a working knowledge of HTML, CSS, PHP, and JavaScrip.

Recent Comments