Course Overview
Synopsis
Although ping has long been a go-to tool for verifying network reachability, its continued use as a primary method for network monitoring is increasingly being questioned. This session explores the limitations, misconceptions, and risks associated with relying on ICMP-based tools like ping in modern, complex networks. Key topics include how ICMP traffic is deprioritized or blocked by many devices and firewalls, how ping fails to reflect application-level performance, and how it can give a false sense of security. The discussion will also delve into more accurate alternatives such as synthetic transactions, SNMP polling, and flow-based monitoring. Participants will leave with a deeper understanding of when ping is useful—and when it may cause more harm than good in a professional monitoring strategy.
Target Audience
Network engineers.
Pre-requisites
To fully benefit from this session, attendees should have a foundational understanding of networking, particularly IP communication and basic diagnostic tools like ping and traceroute. Familiarity with ICMP and how it’s treated differently from TCP/UDP in real-world networks will help in understanding its monitoring limitations. Experience with or awareness of network monitoring systems (e.g., SNMP, NetFlow, or telemetry solutions) and concepts like service-level agreements (SLAs), application performance metrics, and firewall behavior will further enrich the learning experience.