?
Solved

What protocol does Ping uses TCP or UDP

Posted on 2010-11-14
9
Medium Priority
?
19,896 Views
Last Modified: 2013-11-12
What protocol does Ping uses.
Is it TCP or UDP ?
0
Comment
Question by:SrikantRajeev
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
  • 2
  • +1
9 Comments
 
LVL 2

Expert Comment

by:prhowe
ID: 34133452
Neither really.  Ping uses Internet Control Message Protocol (ICMP).

This explains it rather well.
0
 
LVL 2

Expert Comment

by:prhowe
ID: 34133454
http://www.experts-exchange.com/expertsZone.jsp

the link didn't come across, sorry..

0
 
LVL 1

Author Comment

by:SrikantRajeev
ID: 34133460
U mean ICMP does not use either of TCP or UDP
0
Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

 
LVL 36

Expert Comment

by:mccarl
ID: 34133524
> U mean ICMP does not use either of TCP or UDP

No it doesn't. ICMP (ping), TCP and UDP are all protocols that layer on top of IP but are independent of each other.
0
 
LVL 1

Author Comment

by:SrikantRajeev
ID: 34133627
so is ICMP connection oriented protocol or connection less
0
 
LVL 36

Expert Comment

by:mccarl
ID: 34133684
You wouldn't really call it either but it would be closer to a connection-less protocol like UDP. But it isn't used to carry data as such, it is used to report a condition (possibly an error condition). Check out ICMP on wikipedia: http://en.wikipedia.org/wiki/Internet_Control_Message_Protocol
0
 
LVL 12

Expert Comment

by:profgeek
ID: 34135873
ICMP runs alongside IP on the network layer, whereas UDP and TCP are stacked on top of IP on the transport layer.

See the following reference (an excellent site for referencing all protocols):

http://www.protocols.com/pbook/tcpip1.htm

0
 
LVL 36

Accepted Solution

by:
mccarl earned 2000 total points
ID: 34136014
> ICMP runs alongside IP on the network layer

I understand that ICMP may be implemented in the network layer, but it still relies upon IP (ie. stacked on top of) just the same as TCP and UDP are.

The IP header has a field called 'Protocol' that specifies ICMP (1), TCP (6) or UDP (17) among others and the IP payload then contains a header for either ICMP, TCP or UDP, etc. Hence why it is technically stacked on top of IP even though practically it would be implemented alongside IP.
0
 
LVL 1

Author Closing Comment

by:SrikantRajeev
ID: 34244790
Thanks
0

Featured Post

Bringing Advanced Authentication to the SMB Market

WatchGuard announces the acquisition of advanced authentication provider, Datablink, with one mission – to bring secure authentication to SMB, mid-market, and distributed enterprises with a cloud-based solution, ideal for resale via their established channel & MSSP community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I know for anybody starting from Beginner to Expert in Networking knows what OSI model. But this tutorial is for freshers or those who are new to networking world. Why I am putting OSI in such simple and compact manner is because it enables you to k…
Understanding FTPS File transfer is a common requirement in most Enterprises. While there are numerous ways to get a file from Point A to Point B over a network, perhaps the most common method still in use is FTP – File Transfer Protocol. FTP is …
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question