A ping is a message sent across a network from one system to another, usually an ICMP Echo Request packet. It is used to analyze the connectivity of various systems on a network. Pings can be used to create a denial of service attack, so other methods are often used to evaluate network connectivity.
A ping is a type of message that is transmitted across a network from one system to another, usually between a server host and connected user systems. While many different types of messages could potentially be used, the most common type of signal sent for this purpose was an Internet Control Message Protocol (ICMP) Echo Request packet. This is basically a signal with little real data contained in it, and is mainly used to transmit to a connected user and thus generate an “echo” signal. A ping is this process of sending an ICMP echo request and then receiving the echo.
The term “ping” was first used when this type of utility was first created in 1983 and was taken from the term used to describe the signal sent using sonar technology. Active sonar uses generated sound waves, often called pings, that emit from a central location and then bounce off objects and return as an echo. A computer ping utility uses a similar approach to analyze the connectivity of various systems on a network. The server host or another computer on a network, such as a local area network (LAN) or the Internet, sends an ICMP echo request packet to other systems, which then broadcast an echo back to the source.
The entire process is timed, often by including a timestamp in the original ICMP signal which is then compared to the time the echo reaches the source. Once a ping is issued by a server host or similar system, servers and routers are required, through industry standards, to issue an echo packet in response. Numerous pings can be sent to generate an accurate measurement of how long it takes for a signal to travel between the two systems, as well as measure any potential signal loss. The information displayed after a ping test usually includes the minimum time to transmit, the average time, the longest time, and any standard deviations between these results. Any loss of signal is usually indicated as well.
While the use of an ICMP echo request ping was fairly standard during the early development of the Internet and corporate networks, it has become less prevalent in the early 21st century. Pings can be used to create a denial of service attack on a server by flooding the system with echo requests, and malicious software can use pings to find systems for infection. Many Internet Service Providers (ISPs) have blocked echo request messages, so other methods are often used to evaluate network connectivity. Online video games, for example, often measure ping responses using data transmitted during gameplay, then display this information as latency to help users evaluate their connectivity.
Protect your devices with Threat Protection by NordVPN