Tracing a route, Computer Network Security

There is another probing methods i-e Trace Route. To get more detail it is used

 

112_Trace Route.png

 

As given in the figure about the route to DANDELION-PATCH.MIT.EDU was looked out and the program showed all eight computers that were in the path. The additional information is also given in the figure. Thus we look that tracing a route is more interesting tool than Ping as it shows about every computer that falls in the midway of destination and source computers.

 

Posted Date: 7/30/2012 5:13:27 AM | Location : United States







Related Discussions:- Tracing a route, Assignment Help, Ask Question on Tracing a route, Get Answer, Expert's Help, Tracing a route Discussions

Write discussion on Tracing a route
Your posts are moderated
Related Questions
KASONet Pinging System: Project Title:                                                           "KASONet Pinging System"   Brief Overview of Project: The o

IPV6 BASE HEADER FORMAT: It has less information than IPV4 message header. Next header shows to first extension message header. Flow label is partitioned into a TRAFFIC CLASS

Problem (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Describe how

In this work a network intrusion system (package) must implement based on high interaction honeypots. There are two honeypots with different platforms (ubuntu and windows server 20

Host-Based IDS A host-based IDS (HIDS) resides on a particular computer or server and monitors activity only on that system. HIDS also called as system integrity verifiers as th

Question: a) Differentiate between ‘Gross Settlement' and ‘Multilateral Net Settlement' providing suitable examples where necessary to support your answer. b) Differentia

QUESTION a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a segment. Give the source MAC address in hexadecimal; the source IP address, the uppe

IPV6 DATAGRAM FORMAT It is given in the figure below:


QUESTION (a) Discuss why it is considered more secure to use the SET (Secure Electronic Transaction) for e-commerce instead of using SSL (b) Describe how the dual signature