Language Selection

English French German Italian Portuguese Spanish

An Overview of ping

Filed under

Trying to figure out if your laptop is connected to your home or office network? ping it.

ping is a diagnostic tool used for verifying connectivity between two hosts on a network. It sends Internet Control Message Protocol (ICMP) echo request packets to a remote IP address and watches for ICMP responses. The author of the initial version of the ping program that we use today was Mike Muss. Many other people have tweaked, rewritten and variously abused ping since then.

The name ping itself is somewhat colorful. Some people claim that it is an acronym standing for Packet INternet Groper, but this is not the case. ping was named after the sound a sonar tracking system makes. There even is a story claiming that a system administrator wrote a script that repeatedly pinged a host on the network and made an audible "pinging" alert for each success. The system administrator then was able to go through his network methodically checking BNC connectors until he found the dodgy connector that had been plaguing his network. When the noises stopped, he'd found the culprit.

Full Article.

More in Tux Machines

Android Leftovers

Using open source principles to build better engineering teams

We become better software developers by observing how some of the best software in the world is being written. Open source has changed and will continue to change the way the world builds software, not only by creating high-quality reusable components, but by giving us a model for how to produce better software. Open source gives us complete transparency into that process. Read more

LinuxCon Europe and Embedded Linux Conference Europe

How Xen Manages Security Disclosure

When security vulnerabilities are found in any piece of software, the ideal way to fix them is before the general public or attackers are made aware of bugs. Kurth explained that the traditional wisdom in security is to keep any type of predisclosure list for security as small as possible. In Xen's case, the project went through multiple iterations of its security disclosure process, in an attempt to keep things fair for both large and small vendors. Read more