Solved

Internet NAP/NSP & TraceRoute

Posted on 2002-05-03
3
468 Views
Last Modified: 2010-08-05
I need information about the latest NAP (Network Access Point), NSP (Network Servie Point), and the TraceRoute performance.

How many NAP now? Where is the map?

From TraceRoute programs, I found that the visual trace result in doubt. For example, where I used a TraceRoute from Hong Kong to U.S.A., it gave me a straight line from HK to somewhere in U.S.A. without going through NSP/NAP/NSP etc. Where to find the proof for internet traffic routing?




0
Comment
Question by:fhtong
3 Comments
 
LVL 51

Accepted Solution

by:
ahoffmann earned 200 total points
ID: 6989585
traceroute is nor reliable in that way that it shows you the way *each* packet goes. traceroute uses a heuristic method to send udp packets to next hop.
You only can assume that all packets go with a high probability the same route.

Also keep in mind that there are some sophisticated routers inbetween, which use different next hops depending on the traffic load.

The only possibility to get a 100% statement, is to use source routing, but most routers would no longer allow this, for obvious reason ;-)
0
 
LVL 15

Expert Comment

by:samri
ID: 6989700
perhaps you might want to ask the Q ins the Networking (General) Topic area.  Chances are there might be somebody who might have the practical solution for your need.

traceroute should give you a rought (personal opinion) on how the traffic from one point (yours) to the remote point.  And I have to agree with ahoffman's that the route is not always the "same".

cheers.
0
 
LVL 15

Expert Comment

by:periwinkle
ID: 9682110
No comment has been added lately, so it's time to clean up this TA.

I will leave a recommendation in the Cleanup topic area with the following recommendation for this question:

answered by ahoffmann

Please leave any comments here within the next seven days.

PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!

periwinkle
EE Cleanup Volunteer
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
DNS Question 7 62
Google Crawl Errors Producing 404 Errors 4 81
Ubuntu 14 with Apache 7 74
RewriteRule in .htaccess file not working 8 55
It is possible to boost certain documents at query time in Solr. Query time boosting can be a powerful resource for finding the most relevant and "best" content. Of course the more information you index, the more fields you will be able to use for y…
Introduction This article is intended for those who are new to PHP error handling (https://www.experts-exchange.com/articles/11769/And-by-the-way-I-am-New-to-PHP.html).  It addresses one of the most common problems that plague beginning PHP develop…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
In this video I am going to show you how to back up and restore Office 365 mailboxes using CodeTwo Backup for Office 365. Learn more about the tool used in this video here: http://www.codetwo.com/backup-for-office-365/ (http://www.codetwo.com/ba…

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now