Last Articles


Most popular password

Fake ARP-server on the Internet

Why can not I log in as an administrator from any location?

Идентификаторы защиты (SID)

Can you trust a domain that is connected to the Internet?

Administrative boundaries: the forest or domain?

The basic principles of security

Protection system in Windows - Fact or Fiction

Chronology of the ARPANET - INTERNET

Network Information Security: Myths and Realities Omnipotence hackers

Network security model and resource sharing

Remote attacks on distributed computing systems

Characteristics and mechanisms of implementation of standard remote attacks

Administrative methods to protect against remote attacks on the Internet

Control of virtual connections in the distributed CS

Control over route messages to the distributed CS

Pros and cons of a distributed aircraft with dedicated channels

Mythical remote attacks on the Internet

Malfunction host on the network

Substitution of one of the subjects TCP-connections on the Internet

Pros and cons of a distributed aircraft with dedicated channels

 Pluses distributed aircraft with dedicated channels for communication between objects are as follows:
 

  •  Messaging performed directly between the source and the receiver, bypassing the rest of the objects of the system. In such a system in case of lack of access to facilities through which the message is being sent, there is no software capabilities for network traffic analysis;
  •  It is possible to identify objects of a distributed system at the link layer to their addresses without the use of ciphers encrypt the traffic. This is because the system is constructed so that on the dedicated channel connection is feasible with only one particular object.
  •  The appearance of such a distributed system, a false object is impossible without hardware intervention (connect additional devices to the communications channel);
  •  System with dedicated channels for communication - a system in which there is no uncertainty with information about its facilities


  Each object in this system initially is uniquely identified and has full knowledge of other objects of the system.

  The minus FAR with dedicated channels include:

  •  Implementation complexity and high costs of creating a system;
  •  A limited number of objects in the system (depending on the number of inputs from the hub) the complexity of making the system a new object.


  It is also clear that the creation of a global WAN with dedicated channels will require enormous costs and possibly to date.

  Analyzing the pros and cons of using dedicated channels for the construction of secure communications between objects PBC, we can conclude that the creation of distributed systems using only a broadcast transmission medium, or only with dedicated channels effectively. Therefore, it seems proper for building distributed computing systems with branched topology and a large number of objects to use the combined connectivity options as objects.

  To ensure communication between objects large degree of significance, you can use a dedicated channel. Connection is less important objects of the system may be implemented
using a combination of shared bus-dedicated channel.

 This item was discussed options for network topologies with dedicated communication channels.

  In this case, we considered only the physical channels of communication and offers a more or less safe ways of interacting objects in the system through these channels. However, the choice of safe topology RVS is a necessary but not sufficient condition for establishing secure communications between distributed objects Sun

 So, at the end of this paragraph shall formulate the first principle of establishing secure communications facilities in PBC:

 Best in terms of security interaction of objects in the distributed CS is only possible by physically dedicated channel.

Top 5 most read

The basic rules of safe behavior on the Internet

What to do if you forget the BIOS password

How to crack passwords?

Social engineering as a way of committing crimes in the sphere of computer information

You forget your password. What should I do? Part 3


Copyright © 2010 BRV ISTCOM S.R.L.- раскрутка сайта