State diagram of the probe

probe.gif

The tool deliberately ignores an otherwise basic requirement: low intrusion. The target host is flooded with as many packets as it is able to acknowledge.

The intent is to test the stability of the target program under heavy loads. Some sources of problem were also injected.

Next: State diagram of the target

Previous: Time diagram of the protocol

PAM Conference 25-3-2002

Index