Internet Control Message Protocol

Video Activity

Internet Control Message Protocol This lesson focuses on protocols that do not really have port numbers; these are network and data link protocols. This lesson discusses Internet Control Message Protocol (ICMP) which delivers errors and queries to determine if a service is available. It doesn't really transmit information, it is simply a packet of ...

Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
31 hours 29 minutes
Difficulty
Beginner
CEU/CPE
30
Video Description

Internet Control Message Protocol This lesson focuses on protocols that do not really have port numbers; these are network and data link protocols. This lesson discusses Internet Control Message Protocol (ICMP) which delivers errors and queries to determine if a service is available. It doesn't really transmit information, it is simply a packet of data. This lesson also covers Internet Group Management Protocol (IGMP), which is multicast membership.

Video Transcription
00:04
So before we move on to ports and are different protocols that work with different port numbers, we need to understand that there are some protocols which don't work with port numbers. They're like are like our TCP and UDP and our routing protocols there some protocols that don't really have port numbers.
00:23
Now,
00:24
as we'll talk about it in a little bit, we have some of our protocols that work with port numbers, and these protocols work with port numbers because they need to know where to deliver information. Port numbers are essentially a on I P address, plus an additional number,
00:41
and that additional number allows us to have
00:44
sort of like how a country has multiple different ports. It allows our computer to manage multiple different data streams at one time, so those data streams still have to have a place to go. They have to have a logical place to send data to. That's consistent every single time. So we know that
01:03
this data corresponds with this particular activity and those that's what our ports do. Our ports allow us to receive different data streams from different protocols, but there's some protocols that don't work with ports because of the layer that they work on. And these are our network
01:21
and data link Leo Protocols or TCP eyepiece Sweet
01:25
network and data link Leia Protocols. Now,
01:29
we brought back up our chart
01:30
And what's our network layer on our data link layer? Well, our network layer and our data link layer of roos I model are
01:38
right here and right here there are layer to
01:42
and our layer three.
01:45
We have our net. Always I model of seven, a seven layer
01:49
ideological model of how a network works together in the form of layers. And we have physical layer, which is one Please do not throw sausage, pizza away. Physical data link, network transport session, presentation and application.
02:07
These protocols work either on the network layer or the data link layer. The data link layer
02:15
protocols especially, will have port numbers because they're not going to necessarily be communicating via an I P. Address. And you need to have an I P address to have a port number.
02:27
Port numbers are identified as I p address colon port number. So you don't have that I p address. Where does that port number go to? Which of the
02:37
millions billions of I P addresses. Does this court port norm number correspond with? So that's not gonna help us are networking protocols. Some of our networking protocols don't use port numbers either because there's not a particular port that they could deliver to. In this case, they just need to deliver a message or attempt to deliver
02:57
some sort of information. So we used these different protocols.
03:01
So
03:04
we have I, C M P I, G and P R I, C M P and I GMP are going to be on our network layer.
03:13
They're gonna be network protocols,
03:16
and art is
03:19
we're gonna put under our data link. It's really sort of like a layer 2.5 almost because it's going to negotiate between networking and data link layer.
03:28
So
03:29
now that I've gone on enough about why these are special protocols, let's actually talk about what they do. Um,
03:36
ICMP stands for Internet control message protocol,
03:40
and what I see and P does is allows us to deliver errors and queries to other particular I P addresses to determine if a service is available or to determine if there's some sort of error going on you'll see ICMP messages in Ping requests.
03:58
Ah Ping is simply an ICMP echo request to a particular target.
04:03
So
04:04
and I see and P protocol icmp protocol.
04:09
When you think about it, doesn't really transmit data. It's really just a packet of It's just a packet with information.
04:16
So when you think of data packets, we think of packets that transfer things like files or e mails or Web pages. And then you have other packets which are just
04:28
message protocol packets on this case or ICMP packet.
04:31
So if we send an I C and P Echo request packet, what we're doing is we're essentially sending a message to a target computer saying, Can you hear me?
04:44
Can you see me
04:46
now?
04:48
If that if that other side can see us, it's going to send an echo request back now we conform at certain routers. We conform at certain servers not to respond to these, because maybe we don't want somebody to know if it's there. Maybe we don't want someone in numerator on our network or enumerating are router, so we don't want them to send.
05:08
We don't want them to allow ICMP echo requests back.
05:11
Maybe We don't want someone trying to run a denial of service attack on our on our router by sending millions of ICMP requests to that one router because responding to an ICMP request does take network bandwidth, and it does take a little little bit of computing power. But if it has to do that to millions of different locations,
05:30
it's gonna take
05:31
all of our network computing power and all of our bandwidth. And we can't service our clients. So sometimes we will disable ICMP messages back. So just because you're not getting an echo request back doesn't necessarily mean that object is an online
05:46
so
05:47
R I, C and P requests Internet control message protocol. That's going to be a network layer protocol. It's not gonna have a port number associated with it, and it's gonna help us to deliver air messages and query messages. I see A and P we're going to use for things such a Czar Ping requests are trace route requests are
06:08
different. Requests
06:09
two devices to see if a service is available to see if a to see if a particular device is up.
06:15
So we have our icy and peas and well just remember that a ping
06:20
is an I C m p
06:23
echo request.
06:27
We're requesting an echo back, letting letting us know if this device is online. So exam question
06:34
Which network protocol does a ping request to use?
06:40
Does it use art?
06:42
Does it use ICMP? Does it use http? Or does it use
06:47
SQL?
06:49
And our answer would be digging being icmp
06:55
because a ping request is an ICMP echo request.
07:00
Now, next, we have i g m P I g m p stands for Internet group management protocol, and I GMP is going to be
07:09
We don't even have it up here. It's gonna be a multi cast
07:14
membership.
07:16
So Internet Group Management.
07:20
We've talked about how multi cast is one too many and we need a way to manage those multi cast members and we need a way to manage membership in multi cast addresses. Remember, a multi cast addresses an I P address that we send, uh, we send a message to, and that message goes to
07:39
multiple different locations, multiple different computers. I GMP manages those different. There's different addresses, manages how those messages go out to those different computers
Up Next
CompTIA Network+

This CompTIA Network+ certification training provides you with the knowledge to begin a career in network administration. This online course teaches the skills needed to create, configure, manage, and troubleshoot wireless and wired networks.

Instructed By