Chapter 1 Core Network Concepts and Terminology
Different companies own different ISPs, which carry one another's packets between the source and destination hosts. BTW, this is exactly how the worldwide telephone network works. 1. Distributed Denial of Service (DDoS) - The type of attack whose goal is to make a computer or a network unavailable to its users. 1. Know the parts of an IP Packet. - Header Data Trailer 2. Be able to convert decimal to binary and binary to decimal. - An easy method of converting decimal to binary number equivalents is to write down the decimal number and to continually divide-by-2 (two) to give a result and a remainder of either a "1" or a "0" until the final result equals zero. So for example. Convert the decimal number 29410 into its binary number equivalent. 2. Internet of Things (IoT) - Internet use by small devices that talk to one another, with no human involvement. 3. Hosts - Any computer attached to a network. 3. What is the difference between a DoS attack a DDoS attack? - A DoS attack involves flooding a host with traffic so that it cannot serve its legitimate users. A DDoS attack tries to reduce or eliminate a resource's ability to serve its users. The attacker overwhelms the resource by sending a flood of messages from many compromised computers. DDoS uses zombie computers. 4. Network - 4. Why does the Internet need supervisory protocols? - IP, TCP, and UDP deliver packets. However, there are many other Internet standards. Most deal with the management of the Internet beyond packet delivery. These beyond-routing standards are called supervisory protocols
Escuela, estudio y materia
- Institución
- Chapter 1
- Grado
- Chapter 1
Información del documento
- Subido en
- 5 de enero de 2023
- Número de páginas
- 16
- Escrito en
- 2022/2023
- Tipo
- OTRO
- Personaje
- Desconocido
Temas
-
different companies own different isps
-
which carry one anothers packets between the source and destination hosts btw
-
this is exactly how the worldwide telephone network works 1 distributed d