Last Articles


Most popular password

Fake ARP-server on the Internet

Why can not I log in as an administrator from any location?

Идентификаторы защиты (SID)

Can you trust a domain that is connected to the Internet?

Administrative boundaries: the forest or domain?

The basic principles of security

Protection system in Windows - Fact or Fiction

Chronology of the ARPANET - INTERNET

Network Information Security: Myths and Realities Omnipotence hackers

Network security model and resource sharing

Remote attacks on distributed computing systems

Characteristics and mechanisms of implementation of standard remote attacks

Administrative methods to protect against remote attacks on the Internet

Control of virtual connections in the distributed CS

Control over route messages to the distributed CS

Pros and cons of a distributed aircraft with dedicated channels

Mythical remote attacks on the Internet

Malfunction host on the network

Substitution of one of the subjects TCP-connections on the Internet

Dedicated channel communication between objects distributed CS

  All objects are distributed CS interact through communication channels. Discusses the reasons for the success of UA, which consists in the use of PBC for communication between objects broadcast transmission medium which means that all objects are distributed CS connected to a common bus

  This leads to the fact that a message intended (addressed), only one object of the system, will be received by all its objects.

  However, only the object, the address given in the message header as the destination address will be subject to those to whom this message
immediately sent.

  Obviously, in the PBC with the topology of shared bus must use special methods of identifying objects (§ 6.2), since the identification of
link layer is only possible when using network crypto.

  It is also obvious that the ideal from a security perspective is the interaction of objects distributed CS on dedicated channels.

  There are two possible ways to organize the topology of the distributed CS with dedicated channels. In the first case, each object is associated
physical lines of communication with all system objects.

  In the second case, the system can be used by network hub through which the relationship between objects

Top 5 most read

The basic rules of safe behavior on the Internet

What to do if you forget the BIOS password

How to crack passwords?

Social engineering as a way of committing crimes in the sphere of computer information

You forget your password. What should I do? Part 3


Copyright © 2010 BRV ISTCOM S.R.L.- раскрутка сайта