Computer Network and Internet
Answer should be original and similarity (plagiarism) not more than 10% this is very important. Answer should be clear explanation. Answer should be references on Harvard style (Not use Wikipedia) should be Academic Articles or books. When use citation from any reference please keep it between "citation" (Author,Year). As reference you can use the following book: Jim Kurose & Keith Ross (2010), COMPUTER NETWORKING: A Top-Down Approach. 5th ed. Boston: Addison Wesley. Assignment is: 1) Why is it said that packet switching employs statistical multiplexing? Contrast statistical multiplexing with the multiplexing that takes place in TDM. 2) Describe how a botnet can be created and how it can be used for a DDoS attack.