write my essay for me, write my paper, write my essay download , write my essay meta,
Wednesday, June 19, 2019
Why Is It Said That Packet Switching Employs Statistical Multiplexing Essay
Why Is It Said That Packet Switching Employs Statistical Multiplexing - Essay utilisationThis research will begin with the statement that multiplexing refers to a resource that is sh bed among many users and they are of two types The Time Division multiplexing where periodically only hotshot user gains full capacity control at a time (TDM) and the Frequency Division Multiplex (FDM) where all users get exclusive control of the link up capacity. Packet switched networks entails small units of packets being routed through a network. It is footed on the target address enclosed in each packet allowing the same token to be shared among many consumers in the network. Thus, in this type of network, packets do not follow any pre-defined pattern as it is transmitted from different sources. From the supra information, it is true that Packet switching uses statistical multiplex where data packets are transmitted to many users by a undivided source link. Statistical multiplexer utilizes stat istical knowledge of the system and the users hence assuring the quality of service rendered. Therefore, multiplexing is the process of transmitting different data packets simultaneously by combining the signals into a single signal that ably moves through a bandwidth. Later when the signal arrives at its destination it re-assimilates into its normal form and the user receives it. The accurate pattern of the multiplexing course relies heavily on the nature of transmission For example when transmitting analog the signals are multiplexed using the frequency based multiplexing where the bandwidth is alienated into subchannels, thus allowing them to flow in an same manner.... Its design is founded on Rate and Distortion(R-D) (Watkinson, 2008, p. 52)information hauled out from succeeding(prenominal) planned frames. The model considers inter-frame dependencies unambiguous to the implication of encoding limitations of a specific frame over the consecutive one. Describe how a botnet can be created and how it can be used for a DDoS attack Botnet is also known as Zombie army. They consist of greathearted numbers of infected computers mainly by the Trojan that habitually opens the Internet Ray Chat (IRC). It simply refers to (Sun, 2007, p. 65) an organized robotic army of zombies that are used for creating a denial of service attacks (DDoS), as well as permitting spam actions in the inbox and dispersing viruses (Schiller, 2007, p. 30). Zombies are linked to the internet and thus they are used to execute unsporting tasks under distant directions. Botnets has four components namely 1) Diagnosing the computer with wicked codes. 2) Connection to the command and control channel assembled by the attacker.3) Downloads secondary payload on command of the attacker and 4) Performing a wicked activity When creating a botnet one needs an access to several computers, high speed internet contact, a configuring window networking a server virtualization, installed version of c + + + 6.0 as well as a Servicer pack 6 for visual c + + + and PSDK- x86 and lastly the xBot code. Basically, botnets are created through a worm program that is normally transmitted through a spam, spyware and other adware campaigns that leaves some files behind (Watkinson, 2008, p. 76). After installing the visual C+++ 6.0, the service pack 6 and the PSDK x86 one goes ahead to compile and configure xBot. This is done by clicking on file open workspace of the visual c+ + + 6.0 and freight the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.