answersLogoWhite

0

TCP of course because both programs check integrity of sent packages and the delivery status it can be accomplished with TCP (UDP does not support such features).

User Avatar

Wiki User

16y ago

What else can I help you with?

Related Questions

What protocol responds to Ping requests?

A ping command is used to check whether the host is alive or not. A ping command is used when you want to check if the host can send or receive packets. The protocol that is responsible for Ping command is ICMP.


Which are the networking commands in unix?

It depends on which networking protocol you are asking about. For TCP/IP, some of the common commands are: ping netstat ifconfig route traceroute


What is an echo-request?

An echo-request is a sort of ICMP (Internet Control Messaging Protocol). This protocol is used to check and control the IP packet traffic.For example, ping and traceroute packets are echo requests.


What packet is used in ping command?

Packet Internet Groper(PING) is an Internet Control Message Protocol(ICMP) request packet for it's working. ICMP packets are used to check networks are live or not. -- By MYNarutoAnime ----


What is icmp?

ICMP is the "Internet Control Message Protocol". ICMP packets are small packets used in local networks and on the Internet, most typically, for network troubleshooting and problem location. ICMP may be used for reporting the route packets are taking to reach an arbitrary destination either locally or on the Internet or to determine if a particular local or Internet connected device is reachable and/or responding. Various operating systems make use of the ICMP protocol for the above mentioned purposes via utilities such as 'traceroute' and 'ping' in the UNIX/Linux world, or 'tracert' and 'ping' in the Windows world. [JMH]


Change the number of packets sent in a ping?

To change the number of packets sent in a ping command, you can use the -c option followed by the desired number of packets. For example, in a terminal, you would type ping -c 5 [IP address or hostname] to send 5 packets. Adjust the number as needed to send more or fewer packets.


Can ping be traced?

Yes, ping can be traced to some extent. When you send a ping, it generates ICMP (Internet Control Message Protocol) packets that travel over the network, allowing the destination device to respond. Network administrators can monitor and log these packets, which can reveal the source IP address and the path taken through the network. However, the level of traceability can vary depending on network configurations, firewalls, and privacy measures in place.


What is the ping command to send 8 packets as a test?

ping -n 8 destination


What protocol is use by ping?

TCP\IP protocol is run by ping i.e Ping 132.125.12.1 -t will ping the status of device whether healthy or unhealthy The "ping" command is an ICMP (internet Control Management Protocol) control packet. Many websites disallow this type packet, so beware.


What Command is used to test the IPv4 protocol stack?

The command used to test the IPv4 protocol stack is ping. This command sends Internet Control Message Protocol (ICMP) echo request packets to a specified IP address and waits for a response, helping to diagnose network connectivity issues. By using ping, users can determine if a host is reachable over the network and measure the round-trip time for messages sent.


What are Ping floods?

A ping command is to checks whether the client can send or receive packets . A Ping Flood can be defined as an attempt by an attacker on a high bandwidth connection . It is to saturate a network with packets in order to slow the traffic .


What protocol does ping use?

"Ping uses the Internet Control Message Protocol (ICMP) Echo function which is detailed in RFC 792"http://www.activexperts.com/activsocket/tutorials/ping/So the short answer is that it uses the ICMP protocol.