“…( 1 ) connect to a router, which is given in advance, ( 2 ) look up a route for an IP address of the suspicious host and VRF, ( 3 ) connect to the nexthop router of the route if the route is not directly connected, ( 4 ) repeat ( 2 ) and ( 3 ) until a directly connected route is found, i.e., locate a router that has a directly connected route for an IP address of the suspicious host and VRF, ( 5 ) identify a VLAN for the IP address at the router, ( 6 ) locate a directly connected router for the IP address on the VRF, ( 7 ) resolve a MAC address of the suspicious host from an Address Resolution Protocol (ARP) [3] table, ( 8 ) identify a port on which the MAC address is seen in a MAC address forwarding table, ( 9 ) discover a neighboring switch on the port, ( 10 ) repeat from ( 8 ) to ( 9 ) until a neighboring switch is not found, ( 11 ) finally locate a port on an edge switch accommodating the MAC address, and ( 12 ) produce location information of the suspicious host. The on-demand host locating system is described more in detail [4].…”