answersLogoWhite

0

How do you trace the network traffic?

Updated: 8/17/2019
User Avatar

Wiki User

14y ago

Best Answer

Tracing network traffic requires a network monitor, protocol analyzer, or packet sniffer.

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How do you trace the network traffic?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is a network traffic analyzer used for?

A network traffic analyzer is used for analyzing and monitoring the use of network traffic for many devices. Network Traffic Analyzer is also used to monitor the wireless network performance.


How VLAN reduces the network traffic?

yes, it reducing the network traffic


What can sniffers learn if a company being attacked uses NAT?

Through sniffing a network they can basically observe the package traffic on the network. Their sources and destinations. By sniffing they can listen the TCP/UDP ports and analyze the packages and the data inside of it. So by using sniffing tools network adminstrators can monitor unusual traffic activity through, who is sending it to whom and what information is inside of the packages. If anything seen suspecios like unknown ip or unusal huge amount of data traffic they can trace the ip and find the source and what information they are looing for.


Which ethernet card can handle gigabit network traffic?

You would need the ethernet card can handle gigabit network traffic cable.


How do you trace the origin or entry point of the virus in a network?

It is virtually impossible to trace a virus back to the point of origin


Which type of network traffic requires high reliability and security but can sustain a low bandwidth connection in a converged network?

"transactional traffic" is the righ answer.


What network device directs network traffic?

who do Kobe Bryant play for


What restricts traffic onto network?

Firewalls restricts traffic onto a network or onto an individual system. Firewalls can restrict users, web sites, and files from being moved across the network.


What are some of the most popular programs used to monitor a business's network traffic?

Some of the most popular programs which are used to monitor traffic within a business network include PRTG, Network Monitor, Network Eagle and Nagios.


How do you detect zombies in a network?

If you monitor traffic on computers on a network and find traffic occurring when no user is logged on, you probably have a zombie, especially when you are getting outbound traffic when no authorized used is actually using the system.


Is a software-based tool that continually monitors network traffic from a server or workstation attached to the network?

Network monitor.


Which layer of the osi reference model refers to the routing of network traffic?

network layer