Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17


Interpretation of network command "Ping"

Posted on 1999-08-14
Medium Priority
Last Modified: 2010-04-27
Is the following correct?

A returned ping value of 200msec accompanied by a TTL value
of 50 means that the actual round-trip flight time is 150msec.

Question by:wsd2
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2

Expert Comment

ID: 1873553
sounds right to me.

Accepted Solution

firehawk earned 800 total points
ID: 1873554
The TTL value (time to live) can be subtracted from 255 and this will tell you how many hops (usually routers) that your ping packet traversed as it travelled the network.  A TTL value of 246 means that there were only 9 hops and that your packet didn't travel through very many routers.  A TTL value of 31 means that there were 224 hops and that your packet would have been dropped after 31 more routers.  Your 200ms value is the round trip time for a response packet to be received from the IP address you pinged.  PING (Packet INternet Groper) is usually used to see if an IP address can be reached.  Pinging is useful to see if you configured your own TCP/IP correctly.  You can also ping (or some other site) instead of its IP address and the IP address will be resolved by your DNS server.

Author Comment

ID: 1873555

Your answer looks good, but one detail is missing.
Am I correct that the internet cancels the action if
the number of hops exceeds 255?


Expert Comment

ID: 1873556
Yes, the routers will drop the packet after 255 hops.  This is to prevent a packet from traversing the network forever.  The hop count can also be changed.  However, it is normally set to 255 for ping packets.

Featured Post

Take our survey for a chance to win!

As a valued customer of Targus, we’d like to ask you a few questions about us. As thanks, you will be automatically entered for a chance to win a $500 VISA gift card. To enter, just complete the survey by September 15, 2017.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

What do we know about Legacy Video Conferencing? - Full IT support needed! - Complicated systems at outrageous prices! - Intense training required! Highfive believes we need to embrace a new alternative.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
In this video, Percona Solution Engineer Rick Golba discuss how (and why) you implement high availability in a database environment. To discuss how Percona Consulting can help with your design and architecture needs for your database and infrastr…
In response to a need for security and privacy, and to continue fostering an environment members can turn to for support, solutions, and education, Experts Exchange has created anonymous question capabilities. This new feature is available to our Pr…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question