Download complete project materials on Factors Affecting The Speed Of Internet Access from chapter one to five with references and abstract. You can download it on Msword or PDF
CLICK HERE TO DOWNLOAD THE COMPLETE MATERIAL (CHAPTER 1 -5)
PASS 2024 UTME WITHOUT STRESS:- 👉 DOWNLOAD and PRACTICE with 2023 UTME CBT APP 📱👈
CLICK to DOWNLOAD NOW.:- 👉 PASS Your POST UTME by Downloading Your School's Post UTME Past Questions and Answers 📱👈
ABSTRACT
Today’s crucial information networks are vulnerable to fast-moving attacks by Internet worms and computer viruses. These attacks have the potential to cripple the Internet and compromise the integrity of the data on the end-user machines. Without new types of protection, the Internet remains susceptible to the assault of increasingly aggressive attacks.
A platform has been implemented that actively detects and blocks worms and viruses at multi-Gigabit/second rates. It uses the Field-programmable Port Extender (FPX) to scan for signatures of malicious software (malware) carried in packet payloads.
Dynamically reconfigurable Field Programmable Gate Array (FPGA) logic tracks the state of Internet flows and searches for regular expressions and fixed-strings that appear in the content of packets. Protection is achieved by the incremental deployment of systems throughout the Internet.
TABLE OF CONTENTS
CERTIFICATION PAGE 2
DEDICATION 3
ACKNOWLEDGEMENT 4
ABSTRACT 5
CHAPTER ONE 8
1.0 INTRODUCTION 8
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF STUDY
1.3 IMPORTANCE OF STUDY
1.4 DEFINITION OF TERMS 11
1.5 ASSUMPTION OF STUDY
CHAPTER TWO 13
2.0 LITERETURE REVIEW
2.1 WEAKNESS OF END-SYSTEM PROTECTION
2.2 A GLOBAL THREAT
CHAPTER THREE
3.0 INTERNET CONNECTIVITY AND SPEED
3.1 YOUR COMPUTER
3.2 CABLES AND MODEM
3.3 WIRELESS ROUTERS
3.4 USB MODEMS
3.5 INTERNET VARIABLES
3.6 AMOUNT OF MEMORY BEING USED
CHAPTER FOUR 20
4.0 FACTORS AFFECTING INTERNET CONNECTIVITY
4.1 PACKET LOSS
4.2 WEB SERVER OVERLOAD
4.3 ROUTING CHANGES
4.4 DNS, FORWARD RESOLUTION
4.5 DNS, REVERSE RESOLUTION
4.6 LATENCY
4.7 RETRANSMISSION
4.8 THROUGHPUT
CHAPTER FIVE: CONCLUSION
5.1 LIMITATION OF STUDY
5.2 SUGGESTION FOR FURTHER RESEARCH
5.3 REFERENCES
CHAPTER ONE
INTRODUCTION
Computer virus and Internet worm attacks are pervasive, aggravating, and expensive, both in terms of lost productivity and consumption of network band-width. Attacks by Nimba, Code Red, Slammer, SoBig.F, and MSBlast have infected computers globally, clogged large computer networks, and degraded corporate productivity. It can take weeks to months for information Technology staff to sanitize infected computers throughout a network after an outbreak. The direct cost to recover from just the ‘Code Red version two’ worm alone was $2.6 billion.
In much the same way that a human virus spreads between people that come in contact, computer viruses and Internet worms spread when computers communicate electronically. Once a few systems are compromised, they proceed to infect other machines, which in turn quickly spread the infection throughout a network. As is the case with the spread of a contagious disease like SARS, the number of infected computers will grow exponentially unless contained.
Computer systems spread contagion much more quickly than humans because they can communicate nearly instantly over large geographical distances.
“The Blaster worm infected over 400,000 computers in less than five days.
In fact, about one in three Internet users are infected with some type of virus or worm every year. The speed at which worms and viruses can spread is astonishing. What’s equally astonishing is the lethargic pace at which people deploy the patches that can prevent infection in the first place”, Congressman Adam Putnam said recently when he opened a congressional hearing.
STATEMENT OF PROBLEM
Both hardware and software RAIDs with redundancy may support the use of hot spare drives, a drive physically installed in the array which is inactive until an active drive fails, when the system automatically replaces the failed drive with the spare, rebuilding the array with the spare drive included. This reduces the mean time to recovery (MTTR), but does not completely eliminate it. Subsequent additional failure(s) in the same RAID redundancy group before the array is fully rebuilt can result in data loss. Rebuilding can take several hours, especially on busy systems.
PURPOSE OF STUDY
The methods used to store data by various RAID controllers are not necessarily compatible, so that it may not be possible to read a RAID on different hardware, with the exception of RAID 1, which is typically represented as plain identical copies of the original data on each drive.
Consequently a non-drive hardware failure may require the use of identical hardware to recover the data, and furthermore an identical configuration has to be reassembled without triggering a rebuild and overwriting the data.
Software RAID however, such as implemented in the Linux kernel, alleviates this concern, as the setup is not hardware dependent, but runs on ordinary drive controllers, and allows the reassembly of an array.
Additionally, individual drives of a RAID 1 (software and most hardware implementations) can be read like normal drives when removed from the array, so no RAID system is required to retrieve the data. Inexperienced data recovery firms typically have a difficult time recovering data from RAID drives, with the exception of RAID1 drives with conventional data structure.
IMPORTANCE OF STUDY
A RAID system used as secondary storage is not intended as a replacement for backing up data. In parity configurations, a RAID provides a backup-like feature to protect from catastrophic data loss caused by physical damage or errors on a single drive within the array. However, many other features of backup systems cannot be provided by a RAID alone.
The most notable is the ability to restore an earlier version of data, which is needed to protect against software errors that write unwanted data to secondary storage, and also to recover from user error and malicious data deletion. A RAID can also be overwhelmed by catastrophic failure that exceeds its recovery capacity and, of course, the entire array is at risk of physical damage by fire, natural disaster, and human forces. Furthermore, a RAID is also vulnerable to controller failure because it is not always possible to migrate a RAID to a new controller without data loss.
DEFINITION OF TERMS
RAID, acronym for Redundant Array of Independent Disks (originally Redundant Array of Inexpensive Disks), is a storage technology that provides increased reliability and functions through redundancy.
Technology is the making, usage, and knowledge of tools, machines, techniques, crafts, systems or methods of organization in order to solve a problem or perform a specific function.
1.5 ASSUMPTION OF STUDY
On a desktop system, a hardware RAID controller may be a PCI or PCIe expansion card or a component integrated into the motherboard; there are controllers for supporting most types of drive technology, such as IDE/ATA, SATA, SCSI, SSA, Fibre Channel, and sometimes even a combination.
The controller and drives may be in a stand-alone enclosure, rather than inside a computer, and the enclosure may be directly attached to a computer, or connected via a SAN.
Most hardware implementations provide a read/write cache, which, depending on the I/O workload, improves performance. In most systems, the write cache is non-volatile (i.e. battery-protected), so pending writes are not lost should a power failure occur.
CLICK HERE TO DOWNLOAD THE COMPLETE MATERIAL (CHAPTER 1 -5)
>GUARANTTEE|:| Score 280 Above in 2024 UTME👉 DOWNLOAD FREE JAMB CBT APP HERE:.: GURRANTTEE Score 280 Above in 2022 UTME👉 DOWNLOAD FREE JAMB CBT APP HERE 📱👈WISH TO STUDY & LIVE in UK?:- STUDY, WORK AND LIVE IN the UK Application Form NOW OUT. Call 08030447894