hie everyone,
What do you mean by throttled data transfer ? Does anybody has any ideas regarding this ? ......please explain me about the same
thnx
hie everyone,
What do you mean by throttled data transfer ? Does anybody has any ideas regarding this ? ......please explain me about the same
thnx
Throttled data transfer (also known as data transfer throttling or lean data transfer) is the deliberate regulation of the data transfer rate in a communications system. Data transfer throttling can be used in any scenario where it is necessary or desirable to limit the amount of data that can be sent or received per unit time.
An example of the use of data transfer throttling is in the prevention of spam or bulk e-mail transmission through a network server. If the number of e-mail messages sent through the server is limited to, say, one destination address per minute, it is impossible for that server to effectively operate as a medium for the transmission of spam because it would take weeks or months to transfer the number of messages necessary for effective marketing by that means. Data transfer throttling can be used to prevent the uploading or downloading of e-mail messages with gigantic attachments that could otherwise overwhelm an e-mail server. It can also be employed by in public Internet access kiosks, wireless hot spots, public libraries and Internet cafes to prevent "bandwidth hogging" by individual users.
If implemented on a large enough scale, data transfer throttling can control the spread of computer viruses, worms or other malware through the Internet. When used for this purpose, a data transfer throttling program is called a virus throttle or malware throttle.
Throttled data transfer is a method of ensuring a bandwidth intensive device, such as a server, will limit ("throttle") the quantity of data it transmits and/or accepts within a specified period of time. Bandwidth throttling helps provide quality of service (QoS) by limiting network congestion and server crashes.
Throttled data transfer is sometimes used by malicious hackers to conceal their activity.
Network administrators often monitor the traffic flowing in and out of their systems.
A sudden, unexplained, dramatic increase in data transfer rate will arouse the suspicion of a wary administrator.
If the attacker employs data transfer throttling, no abnormal "spike" in the transfer rate occurs and the nefarious activity may thereby pass undetected. This increases the length of time required to carry out an effective attack but it does not necessarily discourage a determined hacker.
Bookmarks