Last Articles

Most popular password

Network Information Security: Myths and Realities Omnipotence hackers

Hackers and crackers, or what is good and what is bad?

Chronology of the ARPANET - INTERNET

Protection system in Windows - Fact or Fiction

The basic principles of security

Manager SAM and Active Directory

Administrative boundaries: the forest or domain?

Can you trust a domain that is connected to the Internet?

Идентификаторы защиты (SID)

Why can not I log in as an administrator from any location?

Network security model and resource sharing

Remote attacks on distributed computing systems

Characteristics and mechanisms of implementation of standard remote attacks

Fake ARP-server on the Internet

False DNS-server on the Internet

Substitution of one of the subjects TCP-connections on the Internet

Malfunction host on the network

Mythical remote attacks on the Internet

Dedicated channel communication between objects distributed CS

Dedicated channel communication between objects distributed CS

  All objects are distributed CS interact through communication channels. Discusses the reasons for the success of UA, which consists in the use of PBC for communication between objects broadcast transmission medium which means that all objects are distributed CS connected to a common bus

  This leads to the fact that a message intended (addressed), only one object of the system, will be received by all its objects.

  However, only the object, the address given in the message header as the destination address will be subject to those to whom this message
immediately sent.

  Obviously, in the PBC with the topology of shared bus must use special methods of identifying objects (§ 6.2), since the identification of
link layer is only possible when using network crypto.

  It is also obvious that the ideal from a security perspective is the interaction of objects distributed CS on dedicated channels.

  There are two possible ways to organize the topology of the distributed CS with dedicated channels. In the first case, each object is associated
physical lines of communication with all system objects.

  In the second case, the system can be used by network hub through which the relationship between objects

Top 5 most read

The basic rules of safe behavior on the Internet

Manager SAM and Active Directory

You forget your password. What should I do? Part 3

Идентификаторы защиты (SID)

Social engineering as a way of committing crimes in the sphere of computer information

Copyright © 2010 BRV ISTCOM S.R.L.- раскрутка сайта