answersLogoWhite

0

Flooding most often occurs when a large enough number of packets (the droplets in a stream of data) are flowing through the network that regular data cannot be sent in a normal speed and fashion. Generally it a packet/response of syn/ack or synpackets: the intialization of connections between 2 tcp/ip hosts requires a set of back and forth responses eg. "hey, are you there?" "yes, I'm here." "Are you ready to receive data?" "yes I am, go."

A synflood consists of something like that horrible Verizon Mobile commercial - "Can you hear me now? Can you hear me now? Can you hear me now? Can you hear me now? Can you hear me now? Can you hear me now? Can you hear me now?....." you get the idea. Synflood hosts don't respond to the "yes" back from destination, they keep just asking over and over. The faster the flood, the slower the network and computers on the network will run. There are people who take remote control of a large number of pcs (a zombienet or bot-net) and use these to flood the victim with even larger numbers of syn packets. They get control usually by malware (viruses or trojans) and often can't be traced.

Innocent flooding can occur when a router is given a circular route to some of the hosts on the network - the router asks for the response from a certain host and another router says 'I know where that is.. it's (another interface on the first router)' and passes the requst to router 1, who then passes it again to router 2, who sends it to router 1, who sends it to router 2 ..... using protocols to test for and close internal loops in a network will most often stop flooding.

User Avatar

Wiki User

17y ago

What else can I help you with?

Trending Questions
What is a smart tag indicator in excel? What are the pivot tables normally used for? Is a sub-division of a track that stores data on a disk? How reliable are Lenovo's laptops? What function is performed by Corel presentations? What is the halfway point from lanoka harbor to Bethlehem pa? What type of device looks like a copy machine but provides the functionality of a printer scanner copy machine and sometimes a fax machine? What is network layer of osi reference model? What are the function of various communication softwares in respect to application program performance software teleprocessing software and line control software? Should you buy the MacBook Pro 2.26GHz or the 2.53GHz with the bigger memory hard drive if your going to be using it for school music photos and videos? Why casio fx-82E5 is better than other other scientific calculator? What experience do you have in the use of Microsoft Office packages and other systems? If you walk on s log floating water the log moves in opposite direction explain why this happens? Other than IP what is another example of a protocol that works at the Internet layer of TCP IP? Can a laptop also be called a 'computer' or is the word 'computer' only referred to a PC? Why a magnet mess the screen of a tv or computer monitor up Is it something to do with the tube inside of it? Records stored on magnetic or optical media must be accessed using a? Is it legal to get an American Apple ID while in another country? What is excite pop server port number? How do you get ink out of upholstery?