In this illustration, a computer labeled "Attacker" sends a message, "start attack," to a series of computers labeled "Slave." These slave computers bombard a single router, which is connected to a computer labeled "Victim."