When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Duplex mismatch - Wikipedia

    en.wikipedia.org/wiki/Duplex_mismatch

    Single packets are sent and acknowledged without problems. As a result, a simple ping command fails to detect a duplex mismatch because single packets and their resulting acknowledgments at 1-second intervals do not cause any problem on the network. A terminal session which sends data slowly (in very short bursts) can also communicate successfully.

  3. ping (networking utility) - Wikipedia

    en.wikipedia.org/wiki/Ping_(networking_utility)

    Ping operates by means of Internet Control Message Protocol (ICMP) packets. Pinging involves sending an ICMP echo request to the target host and waiting for an ICMP echo reply. The program reports errors, packet loss , and a statistical summary of the results, typically including the minimum, maximum, the mean round-trip times, and standard ...

  4. Internet Control Message Protocol - Wikipedia

    en.wikipedia.org/wiki/Internet_Control_Message...

    The ICMP header starts after the IPv4 header and is identified by its protocol number, 1. [6] All ICMP packets have an eight-byte header and variable-sized data section. The first four bytes of the header have fixed format, while the last four bytes depend on the type and code of the ICMP packet.

  5. Packet loss - Wikipedia

    en.wikipedia.org/wiki/Packet_loss

    Packet loss occurs when one or more packets of data travelling across a computer network fail to reach their destination. Packet loss is either caused by errors in data transmission, typically across wireless networks, [1] [2] or network congestion. [3]: 36 Packet loss is measured as a percentage of packets lost with respect to packets sent.

  6. Explicit Congestion Notification - Wikipedia

    en.wikipedia.org/wiki/Explicit_Congestion...

    ECN allows end-to-end notification of network congestion without dropping packets. ECN is an optional feature that may be used between two ECN-enabled endpoints when the underlying network infrastructure also supports it. Conventionally, TCP/IP networks signal congestion by dropping packets.

  7. Promiscuous mode - Wikipedia

    en.wikipedia.org/wiki/Promiscuous_mode

    In promiscuous mode, some software might send responses to frames even though they were addressed to another machine. However, experienced sniffers can prevent this (e.g., using carefully designed firewall settings). An example is sending a ping (ICMP echo request) with the wrong MAC address but the right IP address.

  8. traceroute - Wikipedia

    en.wikipedia.org/wiki/Traceroute

    Traceroute can help identify incorrect routing table definitions or firewalls that may be blocking ICMP traffic, or high port UDP in Unix ping, to a site. [clarify] A correct traceroute response does not guarantee connectivity for applications as a firewall may permit ICMP packets but not permit packets of other protocols.

  9. Round-trip delay - Wikipedia

    en.wikipedia.org/wiki/Round-trip_delay

    In the context of computer networks, the signal is typically a data packet. RTT is commonly used interchangeably with ping time , which can be determined with the ping command . However, ping time may differ from experienced RTT with other protocols since the payload and priority associated with ICMP messages used by ping may differ from that ...