Tracing a route, Computer Network Security

There is another probing methods i-e Trace Route. To get more detail it is used

 

112_Trace Route.png

 

As given in the figure about the route to DANDELION-PATCH.MIT.EDU was looked out and the program showed all eight computers that were in the path. The additional information is also given in the figure. Thus we look that tracing a route is more interesting tool than Ping as it shows about every computer that falls in the midway of destination and source computers.

 

Posted Date: 7/30/2012 5:13:27 AM | Location : United States







Related Discussions:- Tracing a route, Assignment Help, Ask Question on Tracing a route, Get Answer, Expert's Help, Tracing a route Discussions

Write discussion on Tracing a route
Your posts are moderated
Related Questions

Elements of Cryptosystems Cryptosystems is characteristically made up of algorithms, data handling techniques, and procedures which are combined in multiple ways to ensure confi

Problem (a) The IEEE 802 series of standards describe both the Physical and Data Link layers of their respective technologies. Two important standards are 802.3 and 802.5, respect

SUCCESS OF IP:  IP has accommodated dramatic modification since real design. But basic rules are still appropriate today. There are many new kinds of hardware. SCALING:

COMPONENTS OF AN INFORMATION SYSTEM The components of an information system are software, data, hardware, people, procedures and Networks. These 6 components are critical to ena

Question 1: (a) (i) Radio waves are subject to several propagation problems. Name any three of them. (ii) A Wi-Fi receiver requires a signal power of 50mW to operate correc

Electronic Mail: Electronic mail which is famous as e-mail, as it is known to its number of users, has been around for more than two decades. Before 1990, it was mainly used in

IP DATAGRAM HEADER FORMAT:  It is given in the figure below:   In the table: VERS denotes the version of IP. H.LEN denotes the header length in units of

Access Controls Access controls addresses admission of a user into a trusted area of organization. It comprises of a combination of policies & technologies. The ways to control

SHIFT OPERATION:  This operation replaced all bits to the left one position. For example in the diagram below a 16-bit CRC hardware is given, which needs three Exclusive OR (