answersLogoWhite

0


Best Answer

... as always ... it depends, but when issuing the command from a *nix OE and not specifying the -I option or others manipulating default settings, it will typically send 3 datagramms for each TTL value, where TTL values start with 1 and ends with 30.

Therefore the answer is 90 packets.

You will notice, that every datagramm is send with a unique destination port, typically starting with port 33435.

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How many UDP packet send in traceroute function?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

How traceroute works?

The "traceroute" program uses ICMP messaging and the time to live (TTL) field in the IP header. It works by sending a packet to the intended host with a TTL value of 1. The first router will send back the ICMP "time exceeded" message to the sending host. Then the traceroute program will send a message with a TTL of 2, then 3, etc. This way it will get information about each router using the information received in the ICMP packets. To get information about the receiving host, the message is sent to a port that is not likely to be serviced by that host. A ICMP "port unreachable" error message is generated and sent back.


How important is TTL to network security what is TTL for and can a Hacker use it to harm you PC or network?

TTL stands for "Time To Live". This is a piece of data in a network packet that specifies how many routers the packet can pass through before the packet expires and is thrown away. Every router that the packet travels through subtracts one from the TTL counter. When it reaches zero, the packet expires. The router will drop the packet, and then send a message back to the computer that sent the packet telling it that the packet has expired. The purpose of the TTL counter is to make routing loops less dangerous. Let me explain.... Routers are devices that look at an incoming data packet and decide where to send it to get it one step closer to its destination. It's possible for one or more routers to be configured such that router A sends the packet to router B, which sends it to router C, which sends it to router A, which then starts it over again. Without the TTL counter, this packet (and any subsequent packet sent to the same destination) would circulate endlessly, taking up bandwidth until someone fixes the routing loop. However, with TTL, each router subtracts one from the TTL counter until eventually the counter hits zero and the packet goes away, giving someone time to fix the problem before the links are so congested with looping packets that it's no longer possible to talk to the router. TTL can affect network security in a couple of ways. Most operating systems set the TTL counter to 64 or 128, which is a pretty large number that will guarantee your packet can get across the Internet. To improve your network security, you can set your TTL counter to a low number. If your internal network is only four routers wide, you can set your TTL to 4. This will ensure that any packets generated on your network will not travel very far beyond your internal network. An attacker can also use the TTL feature to probe your network for the existence and address of your routers. This feature is used by the "traceroute" or "tracert" utility. It works by sending out a packet with a TTL of 1. The first router that the packet encounters will decrement the TTL to 0, drop the packet, then send a message to the traceroute program telling it that the packet expired. By looking at the source address of this packet, traceroute knows the address of the first router. Next traceroute sends a packet with a TTL of 2, which causes the packet to expire at the second router, which sends a message back to traceroute and exposing its address. And so on. Once an attacker knows the addresses of your routers, he or she can start working on compromising them, which can cause you no end of security problems. The solution is to prevent these packets from reaching your routers by using a firewall to block them. HTH, Gdunge


How much to send a packet to china from uk?

It depends on the weight of the packet !


What is the definition of packet marking in networking?

If we are sending a file in one go and if some error occurred in between the file transfer then the complete file has to be resend which wastes the bandwidth so to prevent this, the file to send is divided in to smaller unit which we call packet, and then send packets 1 by one so that if a packet is lost then we need to send only that particular packet not the complete file. As the packet reaches its destination, the destination source send acknowledgement to the sender that the packet has reached to it and it may send the next packet and if packet somehow lost before reaching to the destination source, then the sender itself resends the packet after a fixed amount of time.


What is packet marking?

If we are sending a file in one go and if some error occurred in between the file transfer then the complete file has to be resend which wastes the bandwidth so to prevent this, the file to send is divided in to smaller unit which we call packet, and then send packets 1 by one so that if a packet is lost then we need to send only that particular packet not the complete file. As the packet reaches its destination, the destination source send acknowledgement to the sender that the packet has reached to it and it may send the next packet and if packet somehow lost before reaching to the destination source, then the sender itself resends the packet after a fixed amount of time.


How does traceroute work?

There are multiple versions of traceroute but generally it uses time to live (ttl). Send a pa let with a ttl of 1 and the next router will send back an error message with its IP address. Then send one with a ttl of 2 and the second router sends an error message with its address. Keep increasing the ttl and you end up with the addresses of all routers in the path.


What is packet ratio?

the ratio of the number of delivered data packet to the destination. This illustrates the level of delivered data to the destination.∑ Number of packet receive / ∑ Number of packet send


What technology takes packets and breaks them out into smaller packets and send them over the network?

packet switching


The loopback address is used to send a packet from the?

host to all


If the logical destination address of the packet is corrupted what will happen to the packet?

The receiver acknowledges packets it has received, and if the sender doesn't get an acknowledgment, it will eventually re-send the doubtful packet


What are networking packets?

If we are sending a file in one go and if some error occurred in between the file transfer then the complete file has to be resend which wastes the bandwidth so to prevent this, the file to send is divided in to smaller unit which we call packet, and then send packets 1 by one so that if a packet is lost then we need to send only that particular packet not the complete file.


Which device will send a response to the initial tracert packet from PC1?

LON don