Ping command , Computer Network Security

In the early days when there were some dozen computers machine on the network, it was done individually but now as we have looked that there are millions of computers on the internet so how can we determine the number of computers connected to the internet. This is perform through probing the Internet. Now an automated tool is needed that tests to see whether the given computer is online or offline.

We see that 5 data packets of 64 bytes are sent to Google.com and 5 data packets are received. We see that ping has also shown some additional information such the IP addresses of sears.com, the sequence of packets and the times of transmission called as the round-trip time, as there is no packet loss so it seems that Google.com is connected to the internet.

PROBLEM WITH 'PING':

Ping, as a tool looks like to be simplistic. Now look what are the causes attached with ping. If ping does not view any responses from host machine it can not tell the reason of cause. Because one of the following reasons happen but ping will not specify the reason.

  • Remote computer may have a problem.
  • Local computer may have a problem.
  • Ping sometimes removed because of congestion.

Some computers or networks reject the ping messages. They do this to avoid removal of service of flooding attack. Inspite of these causes ping is still heavily used as a diagnostic tool. Network administrators need ping as soon as they learn about the failure.

 

711_ping command.png

Posted Date: 7/30/2012 5:03:59 AM | Location : United States







Related Discussions:- Ping command , Assignment Help, Ask Question on Ping command , Get Answer, Expert's Help, Ping command Discussions

Write discussion on Ping command
Your posts are moderated
Related Questions
Limitations of firewall Firewalls cannot protect a network if security rules are not followed properly by an organization or if the rules are not defined properly. Firewalls ar

Application Gateways / firewall The application level firewall is installed on a dedicated computer; also called as a proxy server. These servers can store the recently accessed

ADVANCED RESEARCH PROJECT AGENCY (ARPA) The efforts of ARPA was to active all its research groups have accept to new era computers. For this purpose ARPA started investing in wa

a) Define the term "Enterprise Network". b) Briefly discuss the similarity and differences between a switch and a router. c) A company XYZ has been renting the 1 st Floor of

Netfilter Firewall Netfilter is the popular name for the packet filtering system installed by default in the Linux kernel. The filtering system can be used as a very effective

Consider a computer system with three users: Alice, Bob and Cindy. Alice owns the file alicerc, and Bob and Cindy can read it. Cindy can read and write the file bobrc, which Bob ow

KASONet Pinging System: Project Title:                                                           "KASONet Pinging System"   Brief Overview of Project: The o

Produce a short report of your experiences in installing and using PGP. The report should be written in the form of a journal that contains at least the following items: A de

Question (a) Draw a typical hybrid star-ring topology paying attention to how the clients and switching hubs are connected. (b) State 3 main differences between a router

LEGAL, ETHICAL AND PROFESSIONAL ISSUES To minimize liabilities and reduce risks, information security practitioner should: •    to understand current legal environment •    to s