First there will be a sender and a receiver. Sender will send the packets to the receiver. In between the packets will be dropped. This dropping of packets is done by the third party. So we have to identify the packets which are dropped and also we have to identify the third person who are dropping the packets.