Internet Control Message Protocol (ICMP) - LetsDefend
Internet Control Message Protocol (ICMP) - LetsDefend
HomeLearnPracticeChallengePricing
Network Fundamentals II
All Lessons Structure
Introduction to Network Fundamentals 2
Basic Concepts
Network Protocols
Routing
https://app.letsdefend.io/training/lesson_detail/internet-control-message-protocol-icmp-nf-ii 1/4
2/5/24, 11:37 PM Internet Control Message Protocol (ICMP) - LetsDefend
HomeLearnPracticeChallengePricing
Internet Control Message Protocol (ICMP)
The ICMP protocol does not make the IP protocol more secure.
All applications using the IP protocol must support the ICMP protocol.
Not all of the ICMP messages provide information about error control. Some ICMP
messages are used to obtain computer network tests and network information.
The ICMP protocol produces error messages only for the IP packets. The ICMP protocol
does not produce error messages in case of errors related to transmission of ICMP
messages.
ICMP messages do not contain information about what to do to fix the error even though
they show the error messages. This is a situation that is determined by the computer that
receives the error message.
ICMP Applications
1. Ping:
Ping is an application used to find out if the device in the network is communicated by using
ICMP messages. For example, let's apply the ping command on Windows:
As shown in the image above, ICMP Ping Request was sent with “1” Packet with the
parameter “-n”. As we see the reply packet comes back to the sent packet there is a network
communication with the target address.
https://app.letsdefend.io/training/lesson_detail/internet-control-message-protocol-icmp-nf-ii 2/4
2/5/24, 11:37 PM Internet Control Message Protocol (ICMP) - LetsDefend
Note: In some networks, ICMP messages are blocked through the firewall configurations in
terms of security. Therefore, there will be no response to the Ping command in such a
HomeLearnPracticeChallengePricing
network, but the network communication should still be ongoing with the target device.
2. Traceroute
Traceroute is an application used to determine the route that the packets follow until they
reach to their destinations. All the details of the roadmap that the packets follow are
revealed through this application. For example, let's see the application on Windows:
As shown in the image above, the IP addresses of the network devices which are passed until
reaching to “Google.com”have been displayed successfully through the “Tracert” command.
We have covered the basics of ICMP Protocol in this part of our training. We will cover
“Routing” in the next part of the training.
Questions Progress
What could the command written in the Windows command line be in the image above?
Hint
https://app.letsdefend.io/training/lesson_detail/internet-control-message-protocol-icmp-nf-ii 3/4
2/5/24, 11:37 PM Internet Control Message Protocol (ICMP) - LetsDefend
Back Next
HomeLearnPracticeChallengePricing
LetsDefend
Social
Resources
Support
Community
Plans
Roles
https://app.letsdefend.io/training/lesson_detail/internet-control-message-protocol-icmp-nf-ii 4/4