Monday, August 12, 2019

Why Is It Said That Packet Switching Employs Statistical Multiplexing Essay

Why Is It Said That Packet Switching Employs Statistical Multiplexing - Essay Example This research will begin with the statement that multiplexing refers to a resource that is shared among many users and they are of two types;Â   The Time Division multiplexing where periodically only one user gains full capacity control at a time (TDM) and the Frequency Division Multiplex (FDM) where all users get exclusive control of the link capacity. Packet switched networks entails small units of packets being routed through a network. It is footed on the target address enclosed in each packet allowing the same trail to be shared among many consumers in the network. Thus, in this type of network, packets do not follow any pre-defined pattern as it is transmitted from different sources. From the above information, it is true that Packet switching uses statistical multiplex where data packets are transmitted to many users by a single source link. Statistical multiplexer utilizes statistical knowledge of the system and the users hence assuring the quality of service rendered. Â  T herefore, multiplexing is the process of transmitting different data packets simultaneously by combining the signals into a single signal that ably moves through a bandwidth. Later when the signal arrives at its destination it re-assimilates into its normal form and the user receives it. The accurate pattern of the multiplexing course relies heavily on the nature of transmission For example when transmitting analog the signals are multiplexed using the frequency based multiplexing where the bandwidth is alienated into subchannels, thus allowing them to flow in an analogous manner.... Its design is founded on Rate and Distortion(R-D) (Watkinson, 2008, p. 52)information hauled out from consecutive planned frames. The model considers inter-frame dependencies unambiguous to the implication of encoding limitations of a specific frame over the consecutive one. Describe how a botnet can be created and how it can be used for a DDoS attack Botnet is also known as Zombie army. They consist of large numbers of infected computers mainly by the Trojan that habitually opens the Internet Ray Chat (IRC). It simply refers to (Sun, 2007, p. 65) an organized robotic army of zombies that are used for creating a denial of service attacks (DDoS), as well as permitting spam actions in the inbox and dispersing viruses (Schiller, 2007, p. 30). Zombies are linked to the internet and thus they are used to execute wicked tasks under distant directions. Botnets has four components namely 1) Diagnosing the computer with wicked codes. 2) Connection to the command and control channel assembled by the attacker.3) Downloads secondary payload on command of the attacker and 4) Performing a wicked activity When creating a botnet one needs an access to several computers, high speed internet contact, a configuring window networking a server virtualization, installed version of c + + + 6.0 as well as a Servicer pack 6 for visual c + + + and PSDK- x86 and lastly the xBot code. Basically, botnets are created through a worm program that is normally transmitted through a spam, spyware and other adware campaigns that leaves some files behind (Watkinson, 2008, p. 76). After installing the visual C+++ 6.0, the service pack 6 and the PSDK –x86 one goes ahead to compile and configure xBot. This is done by clicking on file open workspace of the visual c+ + + 6.0 and loading the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.