1993
DOI: 10.17487/rfc1393
|View full text |Cite
|
Sign up to set email alerts
|

Traceroute Using an IP Option

Abstract: Traceroute Using an IP Option Status of this MemoThis memo defines an Experimental Protocol for the Internet community. Discussion and suggestions for improvement are requested. Please refer to the current edition of the "IAB Official Protocol Standards" for the standardization state and status of this protocol. Distribution of this memo is unlimited. AbstractTraceroute serves as a valuable network debugging tool. The way in which it is currently implemented has the advantage of being automatically supported b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2007
2007
2020
2020

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 49 publications
(18 citation statements)
references
References 2 publications
0
18
0
Order By: Relevance
“…The original traceroute [11] developed by Malkin is known to produce inconsistent results in the context of load-balancing.…”
Section: Tools Involved a Traceroute Toolmentioning
confidence: 99%
“…The original traceroute [11] developed by Malkin is known to produce inconsistent results in the context of load-balancing.…”
Section: Tools Involved a Traceroute Toolmentioning
confidence: 99%
“…Since the copy of connection request should not be received by the destination host, the PWC agent replaces the TTL value with the number of hops to the border of network. Given the address of the border router, the agent can measure exact number of hops, using the same method as TRACEROUTE does [41]. Thus, the signature extractor can see worm scans as if the sources were not contained, while the scan from the contained host cannot reach the victims.…”
Section: How We Contain a Hostmentioning
confidence: 99%
“…For prerequisite 1, investigations on promising approaches are ongoing. This includes mechanisms to retrieve location information from the TCP/IP protocol stack (e.g., derived from latency measurements based on Traceroute [7] or by leveraging a locationverified care-of address as used in mobile IP) or from technical equipment (e.g., by means of certificates provided by a network operator). Similarly, the selection process of candidates to provide the basic mechanisms for a solution to prerequisite 2 started recently.…”
Section: Solution Approachmentioning
confidence: 99%