#blogswithcc
Read more stories on Hashnode
Articles with this tag
HOW CAN ATTACKER ATTACK NETWORK? 1.Network Sniffing -> Alice is talking to Bob & Eve will secretly listen their talks 2.Network Spoofing -> Eve will...
WHY WE REQUIRE LAYERING IN COMPUTER NETWORKS? It makes discussion easy It makes updating easy LAYERS OF COMPUTER NETWORKS Application layer ->...
LOSS Data loss occurs when queue is full or cache memory of router is full DELAY Due to 4 reasons we have delays Transmission delay -> (packet...
PACKET SWITCHING Data is broken into small packets Route is decided by collection of routers by using routing algorithm Next router is decided by...
COMPONENTS OF COMPUTER NETWORK NETWORK EDGE DEVICES -> iot cars,laptops,phones,etc ACCESS NETWORKS -> these connect network edge devices to outer...
WHAT IS INTERNET ? Internet is collectio nof hardware & software components which execute the protocols which are necessary data communication It...