Tracing a route, Computer Network Security

There is another probing methods i-e Trace Route. To get more detail it is used

 

112_Trace Route.png

 

As given in the figure about the route to DANDELION-PATCH.MIT.EDU was looked out and the program showed all eight computers that were in the path. The additional information is also given in the figure. Thus we look that tracing a route is more interesting tool than Ping as it shows about every computer that falls in the midway of destination and source computers.

 

Posted Date: 7/30/2012 5:13:27 AM | Location : United States







Related Discussions:- Tracing a route, Assignment Help, Ask Question on Tracing a route, Get Answer, Expert's Help, Tracing a route Discussions

Write discussion on Tracing a route
Your posts are moderated
Related Questions
Question: (a) Describe how IPSec provides data source authentication. (b) Which protocol can be used to provide limited traffic analysis confidentiality? Why is it "limite


IPV6 BASE HEADER FORMAT: It has less information than IPV4 message header. Next header shows to first extension message header. Flow label is partitioned into a TRAFFIC CLASS

The key concepts and frameworks covered in modules 1-4 are particularly relevant for this assignment. Assignment 2 relates to the specific course learning objectives 1, 2 and 3:

Question 1: (a) Differentiate between symmetric and asymmetric encryption system. (b) Describe how a digital signature is created. (c) Explain briefly what SSL (secure so

Host-Based IDS A host-based IDS (HIDS) resides on a particular computer or server and monitors activity only on that system. HIDS also called as system integrity verifiers as th

Question: (a) What is the minimum length of a password that could be considered to be "strong" in the context of today's computing power? (b) The security of a PIN system,

how can i start thesis? Please mention so of examples?

how to access tomcat by internet

Students were asked about search engine they used.90 of them said they used google chrome,70 used Internet Explorer,40 used Mozilla Firefox,30 used Google Chrome and Internet Explo