Application scenarios and examples of ping

9

The application scenarios of the ping operation are as follows (the ping command is executed in any view):
Scenario 1: Check the local protocol stack. Run the ping command to check whether the local TCP/IP stack is normal.
For example: ping 127.0.0.1
Scenario 2: On an IP network, check whether the destination host is reachable.Run the ping command on the AR and configure the AR to send ICMP Echo Request packets to the remote device. If the AR can receive ICMP Echo Reply packets from the remote device, the route to the remote device is reachable.
For example: ping 10.1.1.2 //Check whether the host at 10.1.1.2 is reachable.

Scenario 3: Check whether the remote device is reachable on a Layer 3 VPN. On a Layer 3 VPN, devices do not have route information of each other, so the ping destination IP address cannot be used to check whether the remote device is reachable. Run the ping -vpn-instance command to configure the AR to send ICMP Echo Request packets to the remote device in the specified VPN instance. If the AR can receive ICMP Echo Reply packets from the remote device, the route to the remote device is reachable.
For example: ping -vpn-instance vpn1 10.1.1.3 //Check whether the host at 10.1.1.3 on private network vpn1 is reachable.

Scenario 4: When a network is unstable, run the ping -c count -t timeout host command to check the quality of the network between local and remote devices. You can evaluate the network quality by analyzing the packet loss ratio and average delay. On the network with low reliability, use large values of the packet transmission count (-c) and timeout (-t) to achieve accurate detection information.
For example: ping -c 8 -t 4000 10.1.1.4 //Check whether the host at 10.1.1.4 is reachable, set the packet transmission count to 8, and set the timeout interval to 4000 ms.

Scenario 5: Check the path. Run the ping -r host command to check path information between local and remote devices.
For example: ping -r 192.168.108.107

Scenario 6: Check the MTU. Run the ping -f -s command to configure non-fragmentation of ICMP packets and set the size of ICMP packets to obtain the MTU after multiple detection.
For example: ping -f -s 1420 192.168.108.107

Other related questions:
What are the application scenarios of CES
The application scenarios of CES include routine management, alarm notification and capacity adjustment.

Application scenarios of the S1700
S1700 switches are classified into the SNMP-based model, web-managed model, and NMS-free model.

VPN Application Scenario
Through the communication tunnel between the VPC and your traditional data center created by VPN, you can easily use the ECSs and block storage resources provided by the Open Telekom Cloud platform. Applications can be migrated to the cloud and additional web servers can be deployed to increase the computing capacity on a network. In this way, a hybrid cloud is built, which reduces IT O&M costs and protects enterprise core data from being leaked. VPN supports local gateways created for different VPCs to establish an IPSec VPN tunnel with the same remote gateway.

What are the application scenarios of AS
AS applies to enterprise websites, e-commerce, and mobile applications. AS automatically adds new instances to an AS group for applications when necessary and removes extra ones when unnecessary. In this way, you do not need to prepare a large number of ECSs for an expected marketing activity or unexpected peak hours, thereby ensuring system reliability and reducing system operating costs.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top