2/5/24, 11:37 PM Internet Control Message Protocol (ICMP) - LetsDefend
HomeLearnPracticeChallengePricing
Network Fundamentals II
All Lessons Structure
Introduction to Network Fundamentals 2
Basic Concepts
Virtual Local Area Network (VLAN)
Virtual Private Network (VPN)
Network Protocols
OSI Reference Model
Media Access Control (MAC) Address
Address Resolution Protocol (ARP)
Internet Protocol (IP)
Internet Control Message Protocol (ICMP)
Routing
https://app.letsdefend.io/training/lesson_detail/internet-control-message-protocol-icmp-nf-ii 1/4
2/5/24, 11:37 PM Internet Control Message Protocol (ICMP) - LetsDefend
HomeLearnPracticeChallengePricing
Internet Control Message Protocol (ICMP)
What is Internet Control Message Protocol (ICMP)?
The ICMP is the protocol that sends the errors, warnings, and control messages during the
transmission of packets to the sender device.
Features of the ICMP Protocol
Works with the IP protocol.
The ICMP messages are usually created in the following cases:
When the IP packets cannot reach their target.
When the gateway devices are too busy to transmit packets.
When there is a shorter way for the packets to go.
The ICMP protocol does not make the IP protocol more secure.
All applications using the IP protocol must support the ICMP protocol.
Not all of the ICMP messages provide information about error control. Some ICMP
messages are used to obtain computer network tests and network information.
The ICMP protocol produces error messages only for the IP packets. The ICMP protocol
does not produce error messages in case of errors related to transmission of ICMP
messages.
ICMP messages do not contain information about what to do to fix the error even though
they show the error messages. This is a situation that is determined by the computer that
receives the error message.
ICMP Applications
1. Ping:
Ping is an application used to find out if the device in the network is communicated by using
ICMP messages. For example, let's apply the ping command on Windows:
As shown in the image above, ICMP Ping Request was sent with “1” Packet with the
parameter “-n”. As we see the reply packet comes back to the sent packet there is a network
communication with the target address.
https://app.letsdefend.io/training/lesson_detail/internet-control-message-protocol-icmp-nf-ii 2/4
2/5/24, 11:37 PM Internet Control Message Protocol (ICMP) - LetsDefend
Note: In some networks, ICMP messages are blocked through the firewall configurations in
terms of security. Therefore, there will be no response to the Ping command in such a
HomeLearnPracticeChallengePricing
network, but the network communication should still be ongoing with the target device.
2. Traceroute
Traceroute is an application used to determine the route that the packets follow until they
reach to their destinations. All the details of the roadmap that the packets follow are
revealed through this application. For example, let's see the application on Windows:
As shown in the image above, the IP addresses of the network devices which are passed until
reaching to “Google.com”have been displayed successfully through the “Tracert” command.
We have covered the basics of ICMP Protocol in this part of our training. We will cover
“Routing” in the next part of the training.
Questions Progress
What could the command written in the Windows command line be in the image above?
Answer Format: command -n parametervalue X.X.X.X
Answer Format: **** -* * ***.**.**.* Submit
Hint
https://app.letsdefend.io/training/lesson_detail/internet-control-message-protocol-icmp-nf-ii 3/4
2/5/24, 11:37 PM Internet Control Message Protocol (ICMP) - LetsDefend
Back Next
HomeLearnPracticeChallengePricing
LetsDefend
Social
Resources
Support
Community
Plans
Roles
https://app.letsdefend.io/training/lesson_detail/internet-control-message-protocol-icmp-nf-ii 4/4