Quote Originally Posted by Taliriah View Post
Yes, that's kinda the idea. From a purely technical standpoint, you can consider an internet connection as a pipe, and you have data packets coming one after another. You need to read a packet before you can get to the next one. And after reading a packet, you need to see what's in it before you can know if it's a packet from an actual player or some bogus crap sent by a ddoser.

There are ways to mitigate it by detecting and rejecting bogus packets earlier, things like that. But you can never completely fully prevent it. The very properties of the internet that made it so successful (in short: reliability is ensured at the end points and intermediary nodes need only to make a best effort of carrying packets around) means that anyone can send data to anyone else, and it's up to the recipient to sort it out.

Perhaps the best analogy, in the end, would be someone ordering a bunch of pizzas to be delivered at your address.
Ooooo, this makes alot more sense, the pipe thing that is...

Thank you so much for taking the time to respond to me! I think the analogy of someone ordering a bunch of pizzas to be delivered to your address is much easier and maybe I made it abit hard on myself that I tried to break it down in a maybe round about way. I feel like trying to learn more about the issue can help temper expectations abit, so I really appreciate this.