When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Internet Control Message Protocol - Wikipedia

    en.wikipedia.org/wiki/Internet_Control_Message...

    The related ping utility is implemented using the ICMP echo request and echo reply messages. ICMP uses the basic support of IP as if it were a higher-level protocol, however, ICMP is actually an integral part of IP. Although ICMP messages are contained within standard IP packets, ICMP messages are usually processed as a special case ...

  3. Echo Protocol - Wikipedia

    en.wikipedia.org/wiki/Echo_Protocol

    The Echo Protocol is a service in the Internet Protocol Suite defined in 1983 in RFC 862 by Jon Postel. It was originally proposed as a way to test and measure an IP network. A host may connect to a server that supports the Echo Protocol using the Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP) on the well-known port ...

  4. ping (networking utility) - Wikipedia

    en.wikipedia.org/wiki/Ping_(networking_utility)

    Pinging involves sending an ICMP echo request to the target host and waiting for an ICMP echo reply. The program reports errors, packet loss , and a statistical summary of the results, typically including the minimum, maximum, the mean round-trip times, and standard deviation of the mean.

  5. traceroute - Wikipedia

    en.wikipedia.org/wiki/Traceroute

    Traceroute can help identify incorrect routing table definitions or firewalls that may be blocking ICMP traffic, or high port UDP in Unix ping, to a site. [clarify] A correct traceroute response does not guarantee connectivity for applications as a firewall may permit ICMP packets but not permit packets of other protocols.

  6. Using McAfee: Firewalls - AOL Help

    help.aol.com/articles/Using-McAfee-Firewalls

    Computer users can use a ping tool, which sends and receives ICMP Echo Request messages, to determine whether a given computer is connected to the network. You can configure Firewall to prevent or allow computer users to ping your computer. To configure your ICMP ping requests setting: 1.

  7. List of IP protocol numbers - Wikipedia

    en.wikipedia.org/wiki/List_of_IP_protocol_numbers

    ICMP Internet Control Message Protocol: RFC 792: 0x02 2 IGMP Internet Group Management Protocol: RFC 1112: 0x03 3 GGP Gateway-to-Gateway Protocol: RFC 823: 0x04 4 IP-in-IP IP in IP (encapsulation) RFC 2003: 0x05 5 ST Internet Stream Protocol: RFC 1190, RFC 1819: 0x06 6 TCP Transmission Control Protocol: RFC 793: 0x07 7 CBT Core-based trees: RFC ...

  8. ICMP tunnel - Wikipedia

    en.wikipedia.org/wiki/ICMP_tunnel

    ICMP tunneling works by injecting arbitrary data into an echo packet sent to a remote computer. The remote computer replies in the same manner, injecting an answer into another ICMP packet and sending it back. The client performs all communication using ICMP echo request packets, while the proxy uses echo reply packets.

  9. List of TCP and UDP port numbers - Wikipedia

    en.wikipedia.org/wiki/List_of_TCP_and_UDP_port...

    This is a list of TCP and UDP port numbers used by protocols for operation of network applications. The Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) only need one port for bidirectional traffic. TCP usually uses port numbers that match the services of the corresponding UDP implementations, if they exist, and vice versa.