“…As it has been stated before, this transformation is a result of paths traced by the OSPF routing protocol. The nodes collecting data on packet delays will be nodes number 1,6,7,3,9,15,21,20,19,18,34,28,29 (the selected nodes create three "walls" between node 0 and 35 in the topology diagram). LACK will be the steganographic method used.…”